mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
116 lines
4.5 KiB
JSON
116 lines
4.5 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-33616",
|
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Admin authentication can be bypassed with some specific invalid credentials, which allows logging in with an administrative privilege. Sharp Corporation states the telnet feature is implemented on older models only, and is planning to provide the firmware update to remove the feature. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Authentication bypass"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Sharp Corporation",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Multiple MFPs (multifunction printers)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "See the information provided by Sharp Corporation listed under [References]"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"vendor_name": "Toshiba Tec Corporation",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Multiple MFPs (multifunction printers)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "See the information provided by Toshiba Tec Corporation listed under [References]"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
|
"refsource": "MISC",
|
|
"name": "https://global.sharp/products/copier/info/info_security_2024-05.html"
|
|
},
|
|
{
|
|
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
|
"refsource": "MISC",
|
|
"name": "https://jp.sharp/business/print/information/info_security_2024-05.html"
|
|
},
|
|
{
|
|
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.toshibatec.com/information/20240531_02.html"
|
|
},
|
|
{
|
|
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.toshibatec.co.jp/information/20240531_02.html"
|
|
},
|
|
{
|
|
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
|
"refsource": "MISC",
|
|
"name": "https://jvn.jp/en/vu/JVNVU93051062/"
|
|
},
|
|
{
|
|
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
|
"refsource": "MISC",
|
|
"name": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html"
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"baseSeverity": "MEDIUM",
|
|
"baseScore": 5.3,
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
|
|
}
|
|
]
|
|
}
|
|
} |