CVE-2024-32151
📋 TL;DR
This vulnerability in Sharp and Toshiba multifunction printers allows decrypted user passwords to be stored in memory before login and potentially retrieved from coredump files. Attackers with physical or network access could extract passwords, compromising user credentials. Organizations using affected Sharp and Toshiba MFP models are impacted.
💻 Affected Systems
- Sharp multifunction printers
- Toshiba multifunction printers
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers extract administrative passwords, gain full device control, access network resources, and compromise user accounts across systems using the same credentials.
Likely Case
Local attackers or malicious insiders extract user passwords from memory dumps, leading to unauthorized access to the MFP and potentially other systems if password reuse exists.
If Mitigated
With proper network segmentation and access controls, attackers cannot reach vulnerable systems, limiting impact to isolated printer compromise.
🎯 Exploit Status
Exploitation requires access to memory/coredump files, which typically needs some level of system access. The vulnerability details and exploitation methods are publicly documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor-specific firmware updates
Vendor Advisory: https://global.sharp/products/copier/info/info_security_2024-05.html, https://www.toshibatec.co.jp/information/20240531_02.html
Restart Required: Yes
Instructions:
1. Identify affected Sharp/Toshiba MFP models. 2. Check vendor websites for firmware updates. 3. Download and apply firmware patches. 4. Restart devices to complete installation. 5. Verify firmware version post-update.
🔧 Temporary Workarounds
Disable coredump generation
allPrevent creation of memory dump files that could contain decrypted passwords
Vendor-specific - check device administration interface for coredump settings
Restrict physical and network access
allLimit who can access MFPs physically and over the network
Network: firewall rules to restrict MFP access
Physical: secure printer locations with access controls
🧯 If You Can't Patch
- Segment MFPs on isolated network VLANs with strict access controls
- Implement strong password policies and avoid password reuse between MFP and other systems
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against vendor advisories. For Sharp: visit security advisory page. For Toshiba: check model and firmware version.
Check Version:
Check via device web interface: Settings > Device Information > Firmware Version, or vendor-specific administration tools.
Verify Fix Applied:
Verify firmware version has been updated to patched version specified in vendor advisories.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to MFP administration interfaces
- Unusual memory dump or coredump file creation
Network Indicators:
- Unexpected connections to MFPs from unauthorized IPs
- Traffic patterns suggesting memory dump extraction
SIEM Query:
DeviceType="Printer" OR DeviceType="MFP" AND (EventCode="AccessDenied" OR FileCreation="*.core" OR FileCreation="*.dmp")
🔗 References
- https://global.sharp/products/copier/info/info_security_2024-05.html
- https://jp.sharp/business/print/information/info_security_2024-05.html
- https://jvn.jp/en/vu/JVNVU93051062/
- https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html
- https://www.toshibatec.co.jp/information/20240531_02.html
- https://www.toshibatec.com/information/20240531_02.html
- http://seclists.org/fulldisclosure/2024/Jul/0