CVE-2024-27145

9.8 CRITICAL

📋 TL;DR

This CVE describes a path traversal vulnerability (CWE-22) in Toshiba printers' admin web interface that allows file uploads to overwrite arbitrary files. Attackers can remotely compromise printers, though exploitation typically requires combining with other vulnerabilities. All affected Toshiba printer models with vulnerable firmware versions are at risk.

💻 Affected Systems

Products:
  • Toshiba e-STUDIO and other printer models
Versions: Specific firmware versions listed in vendor advisories
Operating Systems: Printer embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin web interface access; typically combined with other vulnerabilities for full exploitation

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete remote compromise of printer leading to persistent malware installation, credential theft, network pivoting, and physical damage to printer hardware.

🟠

Likely Case

Printer compromise enabling unauthorized file system access, configuration changes, and potential use as network foothold for further attacks.

🟢

If Mitigated

Limited impact due to network segmentation, admin interface restrictions, and proper access controls preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires admin access or combination with authentication bypass vulnerabilities; detailed in Full Disclosure mailing list

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://www.toshibatec.com/information/20240531_01.html

Restart Required: Yes

Instructions:

1. Identify printer model and current firmware version. 2. Visit Toshiba support site. 3. Download appropriate firmware update. 4. Apply update via admin interface. 5. Verify successful update and restart printer.

🔧 Temporary Workarounds

Disable Admin Web Interface

all

Disable remote admin web interface access to prevent exploitation

Configure via printer settings menu: Network > Web Service > Disable

Network Segmentation

all

Isolate printers on separate VLAN with strict firewall rules

🧯 If You Can't Patch

  • Implement strict network access controls allowing only trusted IPs to admin interface
  • Disable all unnecessary file upload features in printer configuration

🔍 How to Verify

Check if Vulnerable:

Check printer firmware version against affected versions in Toshiba advisory; test if file upload to admin interface allows path traversal

Check Version:

Access printer admin web interface > System Information > Firmware Version

Verify Fix Applied:

Verify firmware version matches patched version from vendor; test that file upload no longer allows arbitrary path overwrites

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload attempts via admin interface
  • Multiple failed authentication attempts followed by file uploads
  • Configuration file modification logs

Network Indicators:

  • HTTP POST requests to printer admin interface with file upload parameters
  • Unusual outbound connections from printer

SIEM Query:

source="printer_logs" AND (event="file_upload" OR event="config_change") AND user!="authorized_admin"

🔗 References

📤 Share & Export