First published: Fri Jun 14 2024(Updated: )
All the Toshiba printers contain a shell script using the same hardcoded key to encrypt logs. An attacker can decrypt the encrypted files using the hardcoded key. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL.
Credit: ecc0f906-8666-484c-bcf8-c3b7520a72f0
Affected Software | Affected Version | How to fix |
---|---|---|
Toshiba Printer |
This issue is fixed in the version released on June 14, 2024 and all later versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27159 is classified as a high severity vulnerability due to the potential for unauthorized access to sensitive log data.
To mitigate CVE-2024-27159, update your Toshiba printer firmware to the latest version provided by Toshiba.
The risks include unauthorized exposure of sensitive information contained within encrypted logs due to the hardcoded key.
CVE-2024-27159 is difficult to execute in isolation, but can be combined with other vulnerabilities to increase exploitability.
CVE-2024-27159 affects all Toshiba Printers that utilize the vulnerable shell script with the hardcoded key.