Action not permitted
Modal body text goes here.
Modal Title
Modal Body
jvndb-2024-011256
Vulnerability from jvndb
Published
2024-10-28 17:33
Modified
2024-10-28 17:33
Severity ?
Summary
Multiple vulnerabilities in Sharp and Toshiba Tec MFPs
Details
MFPs (multifunction printers) provided by Sharp and Toshiba Tec Corporation contain multiple vulnerabilites listed below.
<ul>
<li>Out-of-bounds Read (CWE-125)
<ul>
<li>CVE-2024-42420</li>
<li>Out-of-bounds read vulnerabilities coming from improper processing of keyword search input and improper processing of SOAP messages</li>
</ul>
</li>
<li>Out-of-bounds Read (CWE-125)
<ul>
<li>CVE-2024-43424</li>
<li>Out-of-bounds read vulnerability coming from improper processing of HTTP request headers</li>
</ul>
</li>
<li>Out-of-bounds Read (CWE-125)
<ul>
<li>CVE-2024-45829</li>
<li>Out-of-bounds read vulnerability in the web page providing data downloading, where query parameters in HTTP requests are improperly processed</li>
</ul>
</li>
<li>Path traversal (CWE-22)
<ul>
<li>CVE-2024-45842</li>
<li>Improper processing of URI data in HTTP PUT requests leads to path traversal vulnerability, unintended internal files may be retrieved</li>
</ul>
</li>
<li>Improper access restriction on some configuration related APIs (CWE-749)
<ul>
<li>CVE-2024-47005</li>
<li>Some configuration related APIs are expected to be called by administrative users only, but insufficiently restricted</li>
</ul>
</li>
<li>Authentication Bypass Using an Alternate Path (CWE-288)
<ul>
<li>CVE-2024-47406</li>
<li>Improper processing of HTTP authentication requests may lead to authentication bypass</li>
</ul>
</li>
<li>Improper processing of query parameters in HTTP requests (CWE-644)
<ul>
<li>CVE-2024-47549</li>
<li>Improper processing of query parameters of HTTP requests may allow contamination of unintended data to HTTP response headers</li>
</ul>
</li>
<li>Reflected Cross-site Scripting (CWE-79)
<ul>
<li>CVE-2024-47801</li>
<li>Reflected cross-site scripting vulnerability coming from improper processing of query parameters in HTTP requests</li>
</ul>
</li>
<li>Stored Cross-site Scripting (CWE-79)
<ul>
<li>CVE-2024-48870</li>
<li>Stored cross-site scripting vulnerability coming from improper input data validation in URI data registration</li>
</ul>
</li>
</ul>
Sharp Corporation reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN.
References
Impacted products
► | Vendor | Product |
---|---|---|
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-011256.html", "dc:date": "2024-10-28T17:33+09:00", "dcterms:issued": "2024-10-28T17:33+09:00", "dcterms:modified": "2024-10-28T17:33+09:00", "description": "MFPs (multifunction printers) provided by Sharp and Toshiba Tec Corporation contain multiple vulnerabilites listed below.\r\n\r\n\u003cul\u003e\r\n\t\u003cli\u003eOut-of-bounds Read (CWE-125)\r\n\t\u003cul\u003e\r\n\t\t\u003cli\u003eCVE-2024-42420\u003c/li\u003e\r\n\t\t\u003cli\u003eOut-of-bounds read vulnerabilities coming from improper processing of keyword search input and improper processing of\u0026nbsp;SOAP messages\u003c/li\u003e\r\n\t\u003c/ul\u003e\r\n\t\u003c/li\u003e\r\n\t\u003cli\u003eOut-of-bounds Read (CWE-125)\r\n\t\u003cul\u003e\r\n\t\t\u003cli\u003eCVE-2024-43424\u003c/li\u003e\r\n\t\t\u003cli\u003eOut-of-bounds read vulnerability coming from improper processing of HTTP request headers\u003c/li\u003e\r\n\t\u003c/ul\u003e\r\n\t\u003c/li\u003e\r\n\t\u003cli\u003eOut-of-bounds Read\u0026nbsp;(CWE-125)\r\n\t\u003cul\u003e\r\n\t\t\u003cli\u003eCVE-2024-45829\u003c/li\u003e\r\n\t\t\u003cli\u003eOut-of-bounds read vulnerability in the web page providing data downloading, where query parameters in HTTP requests are improperly processed\u003c/li\u003e\r\n\t\u003c/ul\u003e\r\n\t\u003c/li\u003e\r\n\t\u003cli\u003ePath traversal\u0026nbsp;(CWE-22)\r\n\t\u003cul\u003e\r\n\t\t\u003cli\u003eCVE-2024-45842\u003c/li\u003e\r\n\t\t\u003cli\u003eImproper processing of URI data in HTTP PUT requests leads to path traversal vulnerability, unintended internal files may be retrieved\u003c/li\u003e\r\n\t\u003c/ul\u003e\r\n\t\u003c/li\u003e\r\n\t\u003cli\u003eImproper access restriction on some configuration related\u0026nbsp;APIs (CWE-749)\r\n\t\u003cul\u003e\r\n\t\t\u003cli\u003eCVE-2024-47005\u003c/li\u003e\r\n\t\t\u003cli\u003eSome configuration related APIs are expected to be called by administrative users only, but insufficiently restricted\u003c/li\u003e\r\n\t\u003c/ul\u003e\r\n\t\u003c/li\u003e\r\n\t\u003cli\u003eAuthentication Bypass Using an Alternate Path\u0026nbsp;(CWE-288)\r\n\t\u003cul\u003e\r\n\t\t\u003cli\u003eCVE-2024-47406\u003c/li\u003e\r\n\t\t\u003cli\u003eImproper processing of HTTP authentication requests may lead to authentication bypass\u003c/li\u003e\r\n\t\u003c/ul\u003e\r\n\t\u003c/li\u003e\r\n\t\u003cli\u003eImproper processing of query parameters in HTTP requests (CWE-644)\r\n\t\u003cul\u003e\r\n\t\t\u003cli\u003eCVE-2024-47549\u003c/li\u003e\r\n\t\t\u003cli\u003eImproper processing of query parameters of HTTP requests may allow contamination of unintended data to HTTP response headers\u003c/li\u003e\r\n\t\u003c/ul\u003e\r\n\t\u003c/li\u003e\r\n\t\u003cli\u003eReflected Cross-site Scripting (CWE-79)\r\n\t\u003cul\u003e\r\n\t\t\u003cli\u003eCVE-2024-47801\u003c/li\u003e\r\n\t\t\u003cli\u003eReflected cross-site scripting vulnerability coming from improper processing of query parameters in HTTP requests\u003c/li\u003e\r\n\t\u003c/ul\u003e\r\n\t\u003c/li\u003e\r\n\t\u003cli\u003eStored Cross-site Scripting (CWE-79)\r\n\t\u003cul\u003e\r\n\t\t\u003cli\u003eCVE-2024-48870\u003c/li\u003e\r\n\t\t\u003cli\u003eStored cross-site scripting vulnerability coming from improper input data validation in URI data registration\u003c/li\u003e\r\n\t\u003c/ul\u003e\r\n\t\u003c/li\u003e\r\n\u003c/ul\u003e\r\n\r\nSharp Corporation reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-011256.html", "sec:cpe": [ { "#text": "cpe:/a:sharp:multiple_product", "@product": "(Multiple Products)", "@vendor": "Sharp Corporation", "@version": "2.2" }, { "#text": "cpe:/a:toshibatec:multiple_product", "@product": "(Multiple Products)", "@vendor": "TOSHIBA TEC", "@version": "2.2" } ], "sec:cvss": { "@score": "9.1", "@severity": "Critical", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2024-011256", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU95063136/index.html", "@id": "JVNVU#95063136", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-42420", "@id": "CVE-2024-42420", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-43424", "@id": "CVE-2024-43424", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-45829", "@id": "CVE-2024-45829", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-45842", "@id": "CVE-2024-45842", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-47005", "@id": "CVE-2024-47005", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-47406", "@id": "CVE-2024-47406", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-47549", "@id": "CVE-2024-47549", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-47801", "@id": "CVE-2024-47801", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-48870", "@id": "CVE-2024-48870", "@source": "CVE" }, { "#text": "https://cwe.mitre.org/data/definitions/125.html", "@id": "CWE-125", "@title": "Out-of-bounds Read(CWE-125)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" }, { "#text": "https://cwe.mitre.org/data/definitions/288.html", "@id": "CWE-288", "@title": "Authentication Bypass Using an Alternate Path or Channel(CWE-288)" }, { "#text": "https://cwe.mitre.org/data/definitions/644.html", "@id": "CWE-644", "@title": "Improper Neutralization of HTTP Headers for Scripting Syntax(CWE-644)" }, { "#text": "https://cwe.mitre.org/data/definitions/749.html", "@id": "CWE-749", "@title": "Exposed Dangerous Method or Function(CWE-749)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Multiple vulnerabilities in Sharp and Toshiba Tec MFPs" }
CVE-2024-47406 (GCVE-0-2024-47406)
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-288 - Authentication Bypass Using an Alternate Path or Channel
Summary
Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-90c80_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "210", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70c65_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "320", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-8081_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "160", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-b476wh_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "413", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m905_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "612", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-6071s_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "613", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-30c25_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "130", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-7580n_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "503", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-8090n_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "405", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-6070v_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "802", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-c545wd_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "262", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-c304wh_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "520", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70m90_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "310", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70m65_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "320", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m1206_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "200", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m7570_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "456", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m6071s_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "413", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-30m35t_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "220", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m6070_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "503", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-b550wd_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "260", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-b455wz_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "404", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-908_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t2.12.h3.00", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-1058_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t1.01.h4.00", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-1208_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t1.01.h4.00", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-47406", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T18:33:07.833042Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T18:38:24.503Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sharp Digital Full-color MFPs and Monochrome MFPs", "vendor": "Sharp Corporation", "versions": [ { "status": "affected", "version": "see the information provided by Sharp Corporation" } ] }, { "product": "e-STUDIO 908", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T2.12.h3.00 and earlier versions" } ] }, { "product": "e-STUDIO 1058", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] }, { "product": "e-STUDIO 1208", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-288", "description": "Authentication Bypass Using an Alternate Path or Channel", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-25T09:02:10.791Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95063136/" }, { "url": "https://global.sharp/products/copier/info/info_security_2024-10.html" }, { "url": "https://www.toshibatec.com/information/20241025_01.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-47406", "datePublished": "2024-10-25T06:18:36.274Z", "dateReserved": "2024-10-16T05:26:40.226Z", "dateUpdated": "2024-10-25T18:38:24.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42420 (GCVE-0-2024-42420)
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 18:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds read
Summary
Sharp and Toshiba Tec MFPs contain multiple Out-of-bounds Read vulnerabilities, due to improper processing of keyword search input and improper processing of SOAP messages.
Crafted HTTP requests may cause affected products crashed.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation. |
||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-90c80_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "210", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70c65_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "320", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-8081_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "160", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-6071s_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "613", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-30c25_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "130", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-7580n_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "503", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-8090n_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "405", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-6070v_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "802", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-c545wd_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "262", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-c304wh_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "520", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70m90_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "310", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70m65_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "320", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m1206_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "200", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m7570_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "456", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m6071s_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "413", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-30m35t_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "220", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-b476wh_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "413", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m905_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "612", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m6070_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "503", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-b550wd_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "260", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-b455wz_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "404", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-908_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t2.12.h3.00", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-1058_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t1.01.h4.00", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-1208_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t1.01.h4.00", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42420", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T18:35:04.039058Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T18:37:13.542Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sharp Digital Full-color MFPs and Monochrome MFPs", "vendor": "Sharp Corporation", "versions": [ { "status": "affected", "version": "see the information provided by Sharp Corporation." } ] }, { "product": "e-STUDIO 908", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T2.12.h3.00 and earlier versions" } ] }, { "product": "e-STUDIO 1058", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] }, { "product": "e-STUDIO 1208", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Sharp and Toshiba Tec MFPs contain multiple Out-of-bounds Read vulnerabilities, due to improper processing of keyword search input and improper processing of SOAP messages.\r\nCrafted HTTP requests may cause affected products crashed." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds read", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-25T09:01:42.113Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95063136/" }, { "url": "https://global.sharp/products/copier/info/info_security_2024-10.html" }, { "url": "https://www.toshibatec.com/information/20241025_01.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-42420", "datePublished": "2024-10-25T06:18:00.481Z", "dateReserved": "2024-10-16T05:26:36.361Z", "dateUpdated": "2024-10-25T18:37:13.542Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-48870 (GCVE-0-2024-48870)
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 14:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site scripting (XSS)
Summary
Sharp and Toshiba Tec MFPs improperly validate input data in URI data registration, resulting in a stored cross-site scripting vulnerability.
If crafted input is stored by an administrative user, malicious script may be executed on the web browsers of other victim users.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Toshiba Tec Corporation | e-STUDIO 908 |
Version: T2.12.h3.00 and earlier versions |
||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-48870", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:15:05.890283Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T14:15:16.927Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "e-STUDIO 908", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T2.12.h3.00 and earlier versions" } ] }, { "product": "e-STUDIO 1058", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] }, { "product": "e-STUDIO 1208", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] }, { "product": "Sharp Digital Full-color MFPs and Monochrome MFPs", "vendor": "Sharp Corporation", "versions": [ { "status": "affected", "version": "see the information provided by Sharp Corporation" } ] } ], "descriptions": [ { "lang": "en", "value": "Sharp and Toshiba Tec MFPs improperly validate input data in URI data registration, resulting in a stored cross-site scripting vulnerability.\r\nIf crafted input is stored by an administrative user, malicious script may be executed on the web browsers of other victim users." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site scripting (XSS)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-25T09:02:25.999Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95063136/" }, { "url": "https://global.sharp/products/copier/info/info_security_2024-10.html" }, { "url": "https://www.toshibatec.com/information/20241025_01.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-48870", "datePublished": "2024-10-25T06:18:57.297Z", "dateReserved": "2024-10-16T05:26:39.202Z", "dateUpdated": "2024-10-25T14:15:16.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45842 (GCVE-0-2024-45842)
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-12-03 17:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper limitation of a pathname to a restricted directory ('Path Traversal')
Summary
Sharp and Toshiba Tec MFPs improperly process URI data in HTTP PUT requests resulting in a path Traversal vulnerability.
Unintended internal files may be retrieved when processing crafted HTTP requests.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-1058_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t1.01.h4.00", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-90c80_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "210", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70c65_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "320", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-8081_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "160", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-6071s_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "613", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-30c25_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "130", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-7580n_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "503", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-8090n_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "405", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-6070v_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "802", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-1208_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t1.01.h4.00", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-c545wd_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "262", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-c304wh_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "520", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70m90_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "310", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70m65_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "320", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m1206_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "200", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m7570_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "456", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m6071s_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "413", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-30m35t_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "220", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-b476wh_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "413", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m905_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "612", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m6070_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "503", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-b550wd_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "260", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-b455wz_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "404", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-908_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t2.12.h3.00", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45842", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T18:33:42.556743Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T17:11:31.613Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sharp Digital Full-color MFPs and Monochrome MFPs", "vendor": "Sharp Corporation", "versions": [ { "status": "affected", "version": "see the information provided by Sharp Corporation" } ] }, { "product": "e-STUDIO 908", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T2.12.h3.00 and earlier versions" } ] }, { "product": "e-STUDIO 1058", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] }, { "product": "e-STUDIO 1208", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Sharp and Toshiba Tec MFPs improperly process URI data in HTTP PUT requests resulting in a path Traversal vulnerability.\r\nUnintended internal files may be retrieved when processing crafted HTTP requests." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "Improper limitation of a pathname to a restricted directory (\u0027Path Traversal\u0027)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-25T09:02:00.482Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95063136/" }, { "url": "https://global.sharp/products/copier/info/info_security_2024-10.html" }, { "url": "https://www.toshibatec.com/information/20241025_01.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-45842", "datePublished": "2024-10-25T06:18:23.519Z", "dateReserved": "2024-10-16T05:26:44.298Z", "dateUpdated": "2024-12-03T17:11:31.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-43424 (GCVE-0-2024-43424)
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 17:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds read
Summary
Sharp and Toshiba Tec MFPs improperly process HTTP request headers, resulting in an Out-of-bounds Read vulnerability.
Crafted HTTP requests may cause affected products crashed.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-90c80_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "210", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70c65_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "320", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-8081_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "160", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-6071s_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "613", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-30c25_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "130", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-7580n_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "503", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-8090n_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "405", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-6070v_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "802", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-c545wd_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "262", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-c304wh_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "520", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70m90_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "310", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70m65_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "320", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m1206_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "200", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m7570_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "456", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m6071s_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "413", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-30m35t_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "220", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-b476wh_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "413", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m905_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "612", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m6070_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "503", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-b550wd_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "260", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-b455wz_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "404", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-908_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t2.12.h3.00", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-1058_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t1.01.h4.00", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-1208_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t1.01.h4.00", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-43424", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:18:09.827242Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T17:16:12.736Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sharp Digital Full-color MFPs and Monochrome MFPs", "vendor": "Sharp Corporation", "versions": [ { "status": "affected", "version": "see the information provided by Sharp Corporation" } ] }, { "product": "e-STUDIO 908", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T2.12.h3.00 and earlier versions" } ] }, { "product": "e-STUDIO 1058", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] }, { "product": "e-STUDIO 1208", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Sharp and Toshiba Tec MFPs improperly process HTTP request headers, resulting in an Out-of-bounds Read vulnerability.\r\nCrafted HTTP requests may cause affected products crashed." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds read", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-25T09:01:48.353Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95063136/" }, { "url": "https://global.sharp/products/copier/info/info_security_2024-10.html" }, { "url": "https://www.toshibatec.com/information/20241025_01.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-43424", "datePublished": "2024-10-25T06:18:10.875Z", "dateReserved": "2024-10-16T05:26:45.607Z", "dateUpdated": "2024-10-25T17:16:12.736Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47549 (GCVE-0-2024-47549)
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 18:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-644 - Improper Neutralization of HTTP Headers for Scripting Syntax
Summary
Sharp and Toshiba Tec MFPs improperly process query parameters in HTTP requests, which may allow contamination of unintended data to HTTP response headers.
Accessing a crafted URL which points to an affected product may cause malicious script executed on the web browser.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47549", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T18:32:15.403947Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T18:32:25.798Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sharp Digital Full-color MFPs and Monochrome MFPs", "vendor": "Sharp Corporation", "versions": [ { "status": "affected", "version": "see the information provided by Sharp Corporation" } ] }, { "product": "e-STUDIO 908", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T2.12.h3.00 and earlier versions" } ] }, { "product": "e-STUDIO 1058", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] }, { "product": "e-STUDIO 1208", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Sharp and Toshiba Tec MFPs improperly process query parameters in HTTP requests, which may allow contamination of unintended data to HTTP response headers.\r\nAccessing a crafted URL which points to an affected product may cause malicious script executed on the web browser." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-644", "description": "Improper Neutralization of HTTP Headers for Scripting Syntax", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-25T09:02:15.707Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95063136/" }, { "url": "https://global.sharp/products/copier/info/info_security_2024-10.html" }, { "url": "https://www.toshibatec.com/information/20241025_01.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-47549", "datePublished": "2024-10-25T06:18:42.287Z", "dateReserved": "2024-10-16T05:26:38.340Z", "dateUpdated": "2024-10-25T18:32:25.798Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47801 (GCVE-0-2024-47801)
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 14:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site scripting (XSS)
Summary
Sharp and Toshiba Tec MFPs improperly process query parameters in HTTP requests, resulting in a reflected cross-site scripting vulnerability.
Accessing a crafted URL which points to an affected product may cause malicious script executed on the web browser.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47801", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:16:37.011885Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T14:16:46.537Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sharp Digital Full-color MFPs and Monochrome MFPs", "vendor": "Sharp Corporation", "versions": [ { "status": "affected", "version": "see the information provided by Sharp Corporation" } ] }, { "product": "e-STUDIO 908", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T2.12.h3.00 and earlier versions" } ] }, { "product": "e-STUDIO 1058", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] }, { "product": "e-STUDIO 1208", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Sharp and Toshiba Tec MFPs improperly process query parameters in HTTP requests, resulting in a reflected cross-site scripting vulnerability.\r\nAccessing a crafted URL which points to an affected product may cause malicious script executed on the web browser." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site scripting (XSS)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-25T09:02:20.957Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95063136/" }, { "url": "https://global.sharp/products/copier/info/info_security_2024-10.html" }, { "url": "https://www.toshibatec.com/information/20241025_01.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-47801", "datePublished": "2024-10-25T06:18:50.793Z", "dateReserved": "2024-10-16T05:26:34.127Z", "dateUpdated": "2024-10-25T14:16:46.537Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45829 (GCVE-0-2024-45829)
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 18:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds read
Summary
Sharp and Toshiba Tec MFPs provide the web page to download data, where query parameters in HTTP requests are improperly processed and resulting in an Out-of-bounds Read vulnerability.
Crafted HTTP requests may cause affected products crashed.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45829", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T18:34:43.043642Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T18:34:50.895Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sharp Digital Full-color MFPs and Monochrome MFPs", "vendor": "Sharp Corporation", "versions": [ { "status": "affected", "version": "see the information provided by Sharp Corporation" } ] }, { "product": "e-STUDIO 908", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T2.12.h3.00 and earlier versions" } ] }, { "product": "e-STUDIO 1058", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] }, { "product": "e-STUDIO 1208", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Sharp and Toshiba Tec MFPs provide the web page to download data, where query parameters in HTTP requests are improperly processed and resulting in an Out-of-bounds Read vulnerability.\r\nCrafted HTTP requests may cause affected products crashed." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds read", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-25T09:01:54.565Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95063136/" }, { "url": "https://global.sharp/products/copier/info/info_security_2024-10.html" }, { "url": "https://www.toshibatec.com/information/20241025_01.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-45829", "datePublished": "2024-10-25T06:18:17.317Z", "dateReserved": "2024-10-16T05:26:41.085Z", "dateUpdated": "2024-10-25T18:34:50.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47005 (GCVE-0-2024-47005)
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-749 - Exposed dangerous method or function
Summary
Sharp and Toshiba Tec MFPs provide configuration related APIs. They are expected to be called by administrative users only, but insufficiently restricted.
A non-administrative user may execute some configuration APIs.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-1058_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t1.01.h4.00", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-90c80_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "210", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70c65_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "320", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-8081_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "160", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-6071s_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "613", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-30c25_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "130", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-7580n_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "503", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-8090n_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "405", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-6070v_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "802", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-1208_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t1.01.h4.00", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-c545wd_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "262", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-c304wh_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "520", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70m90_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "310", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-70m65_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "320", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m1206_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "200", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m7570_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "456", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m6071s_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "413", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-30m35t_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "220", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-b476wh_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "413", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m905_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "612", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-m6070_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "503", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bp-b550wd_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "260", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mx-b455wz_firmware", "vendor": "sharp", "versions": [ { "lessThanOrEqual": "404", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "e-studio-908_firmware", "vendor": "toshibatec", "versions": [ { "lessThanOrEqual": "t2.12.h3.00", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-47005", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T18:33:28.662590Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T18:38:02.777Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sharp Digital Full-color MFPs and Monochrome MFPs", "vendor": "Sharp Corporation", "versions": [ { "status": "affected", "version": "see the information provided by Sharp Corporation" } ] }, { "product": "e-STUDIO 908", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T2.12.h3.00 and earlier versions" } ] }, { "product": "e-STUDIO 1058", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] }, { "product": "e-STUDIO 1208", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "T1.01.h4.00 and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Sharp and Toshiba Tec MFPs provide configuration related APIs. They are expected to be called by administrative users only, but insufficiently restricted.\r\nA non-administrative user may execute some configuration APIs." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-749", "description": "Exposed dangerous method or function", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-25T09:02:05.781Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95063136/" }, { "url": "https://global.sharp/products/copier/info/info_security_2024-10.html" }, { "url": "https://www.toshibatec.com/information/20241025_01.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-47005", "datePublished": "2024-10-25T06:18:30.415Z", "dateReserved": "2024-10-16T05:26:37.236Z", "dateUpdated": "2024-10-25T18:38:02.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…