The Toshiba printers provide several ways to upload files using the web interface without authentication. An attacker can overwrite any insecure files. And the Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. The programs can be replaced by malicious programs by any local or remote attacker. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the Base Score of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https:www.toshibatec.comcontactsproducts As for the affected productsmodelsversions, see the reference URL.


Assigner: ecc0f906-8666-484c-bcf8-c3b7520a72f0

CWE: CWE-276, CWE-276 CWE-22

  • toshiba printer -


CVSS version: 3.1 Base score: 9.8
Base severity: CRITICAL Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitability score: 3.9 Impact score: 5.9

Can you explain the CVE description?

This CVE description is for a vulnerability identified as CVE-2024-27144 affecting Toshiba printers. The vulnerability allows an attacker to upload files using the web interface without authentication, potentially overwriting insecure files. Additionally, the vulnerability can be exploited for Local Privilege Escalation, enabling an attacker to compromise any Toshiba printer remotely. This could result in the replacement of legitimate programs with malicious ones by both local and remote attackers. The CVSS score for this vulnerability is 9.8, indicating a critical severity level. The vector CVSS shows that the vulnerability has no access complexity, no privileges required, and high impact on confidentiality, integrity, and availability. The vulnerability is considered difficult to execute alone but can be combined with other vulnerabilities for a successful attack. The exploitability score is 3.9, and the impact score is 5.9. For more details on related vulnerabilities and affected products/models/versions, the reference URLs provided in the description can be consulted. The status of the vulnerability is EARLY_WARNING, and it was published on June 14, 2024. The CWEs associated with this vulnerability are CWE-276 and CWE-22. Additional information and updates on the vulnerability can be found by following the link provided in the description.

How can this vulnerability be part of an attack tree?

This vulnerability can be part of an attack tree by being used as a stepping stone to gain unauthorized access to the Toshiba printers. An attacker could exploit the ability to upload files without authentication to upload malicious programs onto the printers. Once the attacker has control over the printer, they could then leverage the Local Privilege Escalation vulnerability to escalate their privileges and potentially gain access to sensitive information or perform malicious actions on the network. This vulnerability could also be combined with other vulnerabilities to create a more complex and impactful attack.

Generated on: 2024-07-05