Toshiba Multi-Function Printers Impacted by 40+ Vulnerabilities
Plenty of modern vulnerabilities were found in Toshiba e-STUDIO Multi-Aim Printers (MFPs) which would maybe be used by companies and organizations worldwide.
These vulnerabilities affect 103 varied objects of Toshiba Multi-Aim Printers.
Vulnerabilities acknowledged include Distant Code execution, XML Exterior Entity Injection (XXE), Privilege Escalation, Authentication credential leak, DOM-primarily based mostly XSS, Tremulous Permissions, TOCTOU (Time-Of-Test to Time-Of-Employ) conditions, and a good deal of others.
"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo
Toshiba Multi-Aim Printers
In accordance with the studies shared with Cyber Safety Files, CVE-2024-27171 and CVE-2024-27180 affect the implementation of third-birthday party application systems and also the third-birthday party applications which would maybe be keep in by default on Toshiba Printers.
A threat actor can exploit Toshiba Multi-feature printers the use of a pair of vulnerabilities. The list of Affected Toshiba MFP objects is as follows:
2021AC | 4528AG | 3515AC | 5018A | 3005AC | 3508LP |
2521AC | 5528A | 3615AC | 5118A | 3505AC | 4508LP |
2020AC | 6528A | 4515AC | 5516AC | 4505AC | 5008LP |
2520AC | 6526AC | 4615AC | 5616AC | 5005AC | |
2025NC | 6527AC | 5015AC | 6516AC | 2008A | |
2525AC | 7527AC | 5115AC | 6616AC | 2508A | |
3025AC | 6529A | 2018A | 7516AC | 3008A | |
3525AC | 7529A | 2518A | 7616AC | 3008AG | |
3525ACG | 9029A | 2618A | 5518A | 3508A | |
4525AC | 330AC | 3018A | 5618A | 3508AG | |
4525ACG | 400AC | 3118A | 6518A | 4508A | |
5525AC | 2010AC | 3018AG | 6618A | 4508AG | |
5525ACG | 2110AC | 3518A | 7518A | 5008A | |
6525AC | 2510AC | 3518AG | 7618A | 5506AC | |
6525ACG | 2610AC | 3618A | 8518A | 6506AC | |
2528A | 2015NC | 3618AG | 8618A | 7506AC | |
3028A | 2515AC | 4518A | 2000AC | 5508A | |
3528A | 2615AC | 4518AG | 2500AC | 6508A | |
3528AG | 3015AC | 4618A | 2005NC | 7508A | |
4528A | 3115AC | 4618AG | 2505AC | 8508A |
Furthermore, it became also mentioned that the bodily security of the printers became now not analyzed, and the vulnerabilities were confirmed in varied objects that chase basically the most traditional firmware variations, equivalent to
- e-STUDIO2010AC
- e-STUDIO3005AC
- e-STUDIO3508A
- e-STUDIO5018A
Extra, all these printers chase in Linux and are highly effective and is also leveraged by a threat actor to circulation laterally internal infrastructures.
40 vulnerabilities were reported to Toshiba, and indispensable security advisories were published to tackle these vulnerabilities.
- CVE-2024-27141 – Pre-authenticated Blind XML Exterior Entity (XXE) injection – DoS
- CVE-2024-27142 – Pre-authenticated XXE injection
- CVE-2024-27143 – Pre-authenticated Distant Code Execution as root
- CVE-2024-27144 – Pre-authenticated Distant Code Execution as root or apache and a pair of Local Privilege Escalations
4.1. Distant Code Execution – Upload of a modern .py module internal WSGI Python applications
4.2. Distant Code Execution – Upload of a modern .ini configuration files internal WSGI Python applications
4.3. Distant Code Execution – Upload of a malicious script /tmp/backtraceScript.sh and injection of malicious gdb commands
4.4. Distant Code Execution – Upload of a malicious /home/SYSROM_SRC/make/accepted/bin/sapphost.py program
4.5. Distant Code Execution – Upload of malicious libraries
4.6. Assorted ways to win Distant Code Execution - CVE-2024-27145 – Plenty of Submit-authenticated Distant Code Executions as root
- CVE-2024-27146 – Lack of privileges separation
- CVE-2024-27147 – Local Privilege Escalation and Distant Code Execution the use of snmpd
- CVE-2024-27148 – Local Privilege Escalation and Distant Code Execution the use of nervous PATH
- CVE-2024-27149 – Local Privilege Escalation and Distant Code Execution the use of nervous LD_PRELOAD
- CVE-2024-27150 – Local Privilege Escalation and Distant Code Execution the use of nervous LD_LIBRARY_PATH
- CVE-2024-27151 – Local Privilege Escalation and Distant Code Execution the use of nervous permissions for 106 applications
11.1. 3 inclined applications now not running as root
11.2. 103 inclined applications running as root - CVE-2024-27152 – Local Privilege Escalation and Distant Code Execution the use of nervous permissions for libraries
12.1. Example with /home/SYSROM_SRC/bin/syscallerr - CVE-2024-27153 – Local Privilege Escalation and Distant Code Execution the use of CISSM
- CVE-2024-27154 and CVE-2024-27155 – Passwords kept in sure-textual exclaim material logs and nervous logs
14.1. Certain-textual exclaim material password written in logs when an user logs into the printer
14.2. Certain-textual exclaim material password written in logs when a password is modified - CVE-2024-27156 – Leak of authentication sessions in nervous logs in /ramdisk/work/log itemizing
- CVE-2024-27157 – Leak of authentication sessions in nervous logs in /ramdisk/al/network/log itemizing
- CVE-2024-27158 – Hardcoded root password
- CVE-2024-27159 – Hardcoded password used to encrypt logs
- CVE-2024-27160 – Hardcoded password used to encrypt logs and use of a venerable digest cipher
- CVE-2024-27161 – Hardcoded password used to encrypt files
- CVE-2024-27162 – DOM-primarily based mostly XSS fresh within the /js/TopAccessUtil.js file
- CVE-2024-27163 – Leak of admin password and passwords
- CVE-2024-27164 – Hardcoded credentials in telnetd
- CVE-2024-27165 – Local Privilege Escalation the use of PROCSUID
- CVE-2024-27166 – Tremulous permissions for core files
- CVE-2024-27167 – Tremulous permissions used for Sendmail – Local Privilege Escalation
- CVE-2024-27168 – Hardcoded keys found in Python applications used to generate authentication cookies
- CVE-2024-27169 – Lack of authentication in WebPanel – Local Privilege Escalation
- CVE-2024-27170 – Hardcoded credentials for WebDAV win admission to
- CVE-2024-27171 – Tremulous permissions
- CVE-2024-27172 – Distant Code Execution – snarl injection as root
- CVE-2024-27173 – Distant Code Execution – nervous add
- CVE-2024-27174 – Distant Code Execution – nervous add
- CVE-2024-27175 – Local File Inclusion
- CVE-2024-27176 – Distant Code Execution – nervous add
- CVE-2024-27177 – Distant Code Execution – nervous add
- CVE-2024-27178 – Distant Code Execution – nervous reproduction
- CVE-2024-27179 – Session disclosure within the log files within the set up of applications
- CVE-2024-27180 – TOCTOU vulnerability within the set up of applications, allowing to set up rogue applications and win RCE
Users of these Toshiba merchandise are suggested to upgrade to basically the most traditional version as per Toshiba’s security advisory to stop these vulnerabilities from getting exploited by threat actors.
Source credit : cybersecuritynews.com