We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-34162



Description

The web interface of the affected devices is designed to hide the LDAP credentials even for administrative users. But configuring LDAP authentication to "SIMPLE", the device communicates with the LDAP server in clear-text. The LDAP password can be retrieved from this clear-text communication. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Reserved 2024-05-22 | Published 2024-11-26 | Updated 2024-12-10 | Assigner jpcert


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

Access to critical private variable via public method

Product status

See the information provided by Sharp Corporation listed under [References]
affected

See the information provided by Toshiba Tec Corporation listed under [References]
affected

References

global.sharp/products/copier/info/info_security_2024-05.html

jp.sharp/...ess/print/information/info_security_2024-05.html

www.toshibatec.com/information/20240531_02.html

www.toshibatec.co.jp/information/20240531_02.html

jvn.jp/en/vu/JVNVU93051062/

pierrekim.github.io/...-27-sharp-mfp-17-vulnerabilities.html

cve.org (CVE-2024-34162)

nvd.nist.gov (CVE-2024-34162)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-34162

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.