// For flags

CVE-2024-27143

Pre-authenticated Remote Code Execution

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Toshiba printers use SNMP for configuration. Using the private community, it is possible to remotely execute commands as root on the remote printer. Using this vulnerability will allow any attacker to get a root access on a remote Toshiba printer. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.

Las impresoras Toshiba utilizan SNMP para la configuración. Utilizando la comunidad privada, es posible ejecutar comandos de forma remota como root en la impresora remota. El uso de esta vulnerabilidad permitirá que cualquier atacante obtenga acceso de root en una impresora Toshiba remota. Esta vulnerabilidad se puede ejecutar en combinación con otras vulnerabilidades y es difícil de ejecutar sola. Por lo tanto, la puntuación CVSS para esta vulnerabilidad por sí sola es inferior a la puntuación que figura en la "Puntuación base" de esta vulnerabilidad. Para obtener detalles sobre otras vulnerabilidades relacionadas, consulte al siguiente punto de contacto. https://www.toshibatec.com/contacts/products/ En cuanto a los productos/modelos/versiones afectados, consulte la URL de referencia.

103 models of Toshiba Multi-Function Printers (MFP) are vulnerable to 40 different vulnerabilities including remote code execution, local privilege escalation, xml injection, and more.

*Credits: We expresses its gratitude to Pierre Barre for reporting relevant security vulnerabilities for our products.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-02-21 CVE Reserved
  • 2024-06-14 CVE Published
  • 2024-06-14 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-250: Execution with Unnecessary Privileges
CAPEC
  • CAPEC-122: Privilege Abuse
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Toshiba Tec Corporation
Search vendor "Toshiba Tec Corporation"
Toshiba Tec E-Studio Multi-function Peripheral (MFP)
Search vendor "Toshiba Tec Corporation" for product "Toshiba Tec E-Studio Multi-function Peripheral (MFP)"
*en
Affected