CVE-2024-36254

7.5 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in Sharp and Toshiba Tec multifunction printers could allow attackers to cause denial-of-service conditions by sending specially crafted requests. This affects multiple MFP models from both manufacturers. Organizations using these devices are at risk of service disruption.

💻 Affected Systems

Products:
  • Sharp Corporation MFPs
  • Toshiba Tec Corporation MFPs
Versions: Specific affected models listed in vendor advisories (check references for exact models)
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Exact affected models vary by manufacturer - check vendor advisories for specific model numbers. Both network-connected and potentially USB-connected devices may be affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete printer/service disruption requiring physical restart or service intervention, potentially affecting business operations that rely on printing/scanning functions.

🟠

Likely Case

Temporary service interruption affecting printing, scanning, or copying functions until device is restarted.

🟢

If Mitigated

Minimal impact if devices are properly segmented and access controlled, with quick restart capability available.

🌐 Internet-Facing: MEDIUM - While many MFPs aren't directly internet-facing, those exposed could be targeted for DoS attacks.
🏢 Internal Only: HIGH - Internal attackers or malware could exploit this to disrupt printing services across the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Out-of-bounds read vulnerabilities typically require sending malformed requests to trigger the condition. No authentication bypass mentioned in description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates as specified in vendor advisories

Vendor Advisory: https://global.sharp/products/copier/info/info_security_2024-05.html, https://www.toshibatec.co.jp/information/20240531_02.html

Restart Required: Yes

Instructions:

1. Identify affected MFP models using vendor advisories. 2. Download latest firmware from manufacturer support sites. 3. Apply firmware update following manufacturer instructions. 4. Restart devices after update. 5. Verify firmware version post-update.

🔧 Temporary Workarounds

Network segmentation

all

Isolate MFPs on separate VLANs with strict access controls

Access control restrictions

all

Implement firewall rules to restrict access to MFP management interfaces

🧯 If You Can't Patch

  • Segment MFPs on isolated network segments with strict access controls
  • Implement monitoring for unusual traffic patterns to MFP devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vendor advisories. Use web interface or device display to verify current firmware version.

Check Version:

Check via device web interface (typically http://[printer-ip]) or device control panel under system information

Verify Fix Applied:

Verify firmware version matches or exceeds patched version specified in vendor advisories. Test device functionality after update.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed connection attempts to printer services
  • Printer service crashes or restarts
  • Unusual network traffic patterns to printer IPs

Network Indicators:

  • Abnormal packet patterns to printer ports (typically 80, 443, 9100)
  • Multiple connection attempts from single source to printer

SIEM Query:

source_ip=[printer_ip] AND (event_type=service_crash OR connection_count>threshold)

🔗 References

📤 Share & Export