We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-33616



Description

Admin authentication can be bypassed with some specific invalid credentials, which allows logging in with an administrative privilege. Sharp Corporation states the telnet feature is implemented on older models only, and is planning to provide the firmware update to remove the feature. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Reserved 2024-05-22 | Published 2024-11-26 | Updated 2024-12-10 | Assigner jpcert


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

Authentication bypass

Product status

See the information provided by Sharp Corporation listed under [References]
affected

See the information provided by Toshiba Tec Corporation listed under [References]
affected

References

global.sharp/products/copier/info/info_security_2024-05.html

jp.sharp/...ess/print/information/info_security_2024-05.html

www.toshibatec.com/information/20240531_02.html

www.toshibatec.co.jp/information/20240531_02.html

jvn.jp/en/vu/JVNVU93051062/

pierrekim.github.io/...-27-sharp-mfp-17-vulnerabilities.html

cve.org (CVE-2024-33616)

nvd.nist.gov (CVE-2024-33616)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-33616

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.