Toshiba printers will display the password of the admin user in clear-text and additional passwords when sending 2 specific HTTP requests to the internal API. An attacker stealing the cookie of an admin or abusing a XSS vulnerability can recover this password in clear-text and compromise the printer. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.
References
Configurations
No configuration.
History
04 Jul 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Jun 2024, 12:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Jun 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-14 04:15
Updated : 2024-07-04 05:15
NVD link : CVE-2024-27163
Mitre link : CVE-2024-27163
CVE.ORG link : CVE-2024-27163
JSON object : View
Products Affected
No product.
CWE
CWE-319
Cleartext Transmission of Sensitive Information