CVE-2024-27145
📋 TL;DR
This CVE describes a path traversal vulnerability (CWE-22) in Toshiba printers' admin web interface that allows file uploads to overwrite arbitrary files. Attackers can remotely compromise printers, though exploitation typically requires combining with other vulnerabilities. All affected Toshiba printer models with vulnerable firmware versions are at risk.
💻 Affected Systems
- Toshiba e-STUDIO and other printer models
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete remote compromise of printer leading to persistent malware installation, credential theft, network pivoting, and physical damage to printer hardware.
Likely Case
Printer compromise enabling unauthorized file system access, configuration changes, and potential use as network foothold for further attacks.
If Mitigated
Limited impact due to network segmentation, admin interface restrictions, and proper access controls preventing exploitation.
🎯 Exploit Status
Exploitation requires admin access or combination with authentication bypass vulnerabilities; detailed in Full Disclosure mailing list
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific firmware versions
Vendor Advisory: https://www.toshibatec.com/information/20240531_01.html
Restart Required: Yes
Instructions:
1. Identify printer model and current firmware version. 2. Visit Toshiba support site. 3. Download appropriate firmware update. 4. Apply update via admin interface. 5. Verify successful update and restart printer.
🔧 Temporary Workarounds
Disable Admin Web Interface
allDisable remote admin web interface access to prevent exploitation
Configure via printer settings menu: Network > Web Service > Disable
Network Segmentation
allIsolate printers on separate VLAN with strict firewall rules
🧯 If You Can't Patch
- Implement strict network access controls allowing only trusted IPs to admin interface
- Disable all unnecessary file upload features in printer configuration
🔍 How to Verify
Check if Vulnerable:
Check printer firmware version against affected versions in Toshiba advisory; test if file upload to admin interface allows path traversal
Check Version:
Access printer admin web interface > System Information > Firmware Version
Verify Fix Applied:
Verify firmware version matches patched version from vendor; test that file upload no longer allows arbitrary path overwrites
📡 Detection & Monitoring
Log Indicators:
- Unusual file upload attempts via admin interface
- Multiple failed authentication attempts followed by file uploads
- Configuration file modification logs
Network Indicators:
- HTTP POST requests to printer admin interface with file upload parameters
- Unusual outbound connections from printer
SIEM Query:
source="printer_logs" AND (event="file_upload" OR event="config_change") AND user!="authorized_admin"
🔗 References
- http://seclists.org/fulldisclosure/2024/Jul/1
- https://jvn.jp/en/vu/JVNVU97136265/index.html
- https://www.toshibatec.com/information/20240531_01.html
- https://www.toshibatec.com/information/pdf/information20240531_01.pdf
- http://seclists.org/fulldisclosure/2024/Jul/1
- https://jvn.jp/en/vu/JVNVU97136265/index.html
- https://www.toshibatec.com/information/20240531_01.html
- https://www.toshibatec.com/information/pdf/information20240531_01.pdf