We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-33610



Description

"sessionlist.html" and "sys_trayentryreboot.html" are accessible with no authentication. "sessionlist.html" provides logged-in users' session information including session cookies, and "sys_trayentryreboot.html" allows to reboot the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Reserved 2024-05-22 | Published 2024-11-26 | Updated 2024-11-26 | Assigner jpcert


CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

Authentication Bypass Using an Alternate Path or Channel

Product status

See the information provided by Sharp Corporation listed under [References]
affected

See the information provided by Toshiba Tec Corporation listed under [References]
affected

References

global.sharp/products/copier/info/info_security_2024-05.html

jp.sharp/...ess/print/information/info_security_2024-05.html

www.toshibatec.com/information/20240531_02.html

www.toshibatec.co.jp/information/20240531_02.html

jvn.jp/en/vu/JVNVU93051062/

pierrekim.github.io/...-27-sharp-mfp-17-vulnerabilities.html

cve.org (CVE-2024-33610)

nvd.nist.gov (CVE-2024-33610)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-33610

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.