Новости компьютерной безопасности:

  Latest News

Toshiba Multi-Function Printers Impacted by 40+ Vulnerabilities

С сайта: Vulnerability(cybersecuritynews.com)

Toshiba Multi-Function Printers Impacted by 40+ Vulnerabilities

Author: Eswar

Several new vulnerabilities have been discovered in Toshiba e-STUDIO Multi-Function Printers (MFPs) that are used by businesses and organizations worldwide.

These vulnerabilities affect 103 different models of Toshiba Multi-Function Printers. 

Vulnerabilities identified include Remote Code execution, XML External Entity Injection (XXE), Privilege Escalation, Authentication credential leak, DOM-based XSS, Insecure Permissions, TOCTOU (Time-Of-Check to Time-Of-Use) conditions, and many others.

"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo

Toshiba Multi-Function Printers
According to the reports shared with Cyber Security News, CVE-2024-27171 and CVE-2024-27180 affect the implementation of third-party application systems and also the third-party applications that are installed by default on Toshiba Printers.

A threat actor can exploit Toshiba Multi-function printers using multiple vulnerabilities. The list of Affected Toshiba MFP models is as follows:

2021AC4528AG3515AC5018A3005AC3508LP2521AC5528A3615AC5118A3505AC4508LP2020AC6528A4515AC5516AC4505AC5008LP2520AC6526AC4615AC5616AC5005AC 2025NC6527AC5015AC6516AC2008A 2525AC7527AC5115AC6616AC2508A 3025AC6529A2018A7516AC3008A 3525AC7529A2518A7616AC3008AG 3525ACG9029A2618A5518A3508A 4525AC330AC3018A5618A3508AG 4525ACG400AC3118A6518A4508A 5525AC2010AC3018AG6618A4508AG 5525ACG2110AC3518A7518A5008A 6525AC2510AC3518AG7618A5506AC 6525ACG2610AC3618A8518A6506AC 2528A2015NC3618AG8618A7506AC 3028A2515AC4518A2000AC5508A 3528A2615AC4518AG2500AC6508A 3528AG3015AC4618A2005NC7508A 4528A3115AC4618AG2505AC8508A 
Additionally, it was also mentioned that the physical security of the printers was not analyzed, and the vulnerabilities have been confirmed in different models that run the latest firmware versions, such as

  • e-STUDIO2010AC
  • e-STUDIO3005AC
  • e-STUDIO3508A
  • e-STUDIO5018A

Further, all these printers run in Linux and are powerful and can be leveraged by a threat actor to move laterally inside infrastructures.

40 vulnerabilities were reported to Toshiba, and necessary security advisories have been published to address these vulnerabilities.

  1. CVE-2024-27141 – Pre-authenticated Blind XML External Entity (XXE) injection – DoS
  2. CVE-2024-27142 – Pre-authenticated XXE injection
  3. CVE-2024-27143 – Pre-authenticated Remote Code Execution as root
  4. CVE-2024-27144 – Pre-authenticated Remote Code Execution as root or apache and multiple Local Privilege Escalations
    4.1. Remote Code Execution – Upload of a new .py module inside WSGI Python programs
    4.2. Remote Code Execution – Upload of a new .ini configuration files inside WSGI Python programs
    4.3. Remote Code Execution – Upload of a malicious script /tmp/backtraceScript.sh and injection of malicious gdb commands
    4.4. Remote Code Execution – Upload of a malicious /home/SYSROM_SRC/build/common/bin/sapphost.py program
    4.5. Remote Code Execution – Upload of malicious libraries
    4.6. Other ways to get Remote Code Execution
  5. CVE-2024-27145 – Multiple Post-authenticated Remote Code Executions as root
  6. CVE-2024-27146 – Lack of privileges separation
  7. CVE-2024-27147 – Local Privilege Escalation and Remote Code Execution using snmpd
  8. CVE-2024-27148 – Local Privilege Escalation and Remote Code Execution using insecure PATH
  9. CVE-2024-27149 – Local Privilege Escalation and Remote Code Execution using insecure LD_PRELOAD
  10. CVE-2024-27150 – Local Privilege Escalation and Remote Code Execution using insecure LD_LIBRARY_PATH
  11. CVE-2024-27151 – Local Privilege Escalation and Remote Code Execution using insecure permissions for 106 programs
    11.1. 3 vulnerable programs not running as root
    11.2. 103 vulnerable programs running as root
  12. CVE-2024-27152 – Local Privilege Escalation and Remote Code Execution using insecure permissions for libraries
    12.1. Example with /home/SYSROM_SRC/bin/syscallerr
  13. CVE-2024-27153 – Local Privilege Escalation and Remote Code Execution using CISSM
  14. CVE-2024-27154 and CVE-2024-27155 – Passwords stored in clear-text logs and insecure logs
    14.1. Clear-text password written in logs when an user logs into the printer
    14.2. Clear-text password written in logs when a password is modified
  15. CVE-2024-27156 – Leak of authentication sessions in insecure logs in /ramdisk/work/log directory
  16. CVE-2024-27157 – Leak of authentication sessions in insecure logs in /ramdisk/al/network/log directory
  17. CVE-2024-27158 – Hardcoded root password
  18. CVE-2024-27159 – Hardcoded password used to encrypt logs
  19. CVE-2024-27160 – Hardcoded password used to encrypt logs and use of a weak digest cipher
  20. CVE-2024-27161 – Hardcoded password used to encrypt files
  21. CVE-2024-27162 – DOM-based XSS present in the /js/TopAccessUtil.js file
  22. CVE-2024-27163 – Leak of admin password and passwords
  23. CVE-2024-27164 – Hardcoded credentials in telnetd
  24. CVE-2024-27165 – Local Privilege Escalation using PROCSUID
  25. CVE-2024-27166 – Insecure permissions for core files
  26. CVE-2024-27167 – Insecure permissions used for Sendmail – Local Privilege Escalation
  27. CVE-2024-27168 – Hardcoded keys found in Python applications used to generate authentication cookies
  28. CVE-2024-27169 – Lack of authentication in WebPanel – Local Privilege Escalation
  29. CVE-2024-27170 – Hardcoded credentials for WebDAV access
  30. CVE-2024-27171 – Insecure permissions
  31. CVE-2024-27172 – Remote Code Execution – command injection as root
  32. CVE-2024-27173 – Remote Code Execution – insecure upload
  33. CVE-2024-27174 – Remote Code Execution – insecure upload
  34. CVE-2024-27175 – Local File Inclusion
  35. CVE-2024-27176 – Remote Code Execution – insecure upload
  36. CVE-2024-27177 – Remote Code Execution – insecure upload
  37. CVE-2024-27178 – Remote Code Execution – insecure copy
  38. CVE-2024-27179 – Session disclosure inside the log files in the installation of applications
  39. CVE-2024-27180 – TOCTOU vulnerability in the installation of applications, allowing to install rogue applications and get RCE

Users of these Toshiba products are recommended to upgrade to the latest version as per Toshiba’s security advisory to prevent these vulnerabilities from getting exploited by threat actors.



#Cyber_Security_News #Endpoint_Security #Exploit #Vulnerability #cyber_security #Multi-Function_Printers #Toshiba #Vulnerabilities

Оригинальная версия на сайте: Toshiba Multi-Function Printers Impacted by 40+ Vulnerabilities
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.