CVE-2024-42420

7.5 HIGH

📋 TL;DR

Sharp and Toshiba Tec multifunction printers (MFPs) contain out-of-bounds read vulnerabilities in their web interfaces. Attackers can crash affected devices by sending specially crafted HTTP requests containing malicious keyword search inputs or SOAP messages. Organizations using vulnerable Sharp and Toshiba Tec MFP models are affected.

💻 Affected Systems

Products:
  • Sharp MFPs
  • Toshiba Tec MFPs
Versions: Specific models and firmware versions listed in vendor advisories
Operating Systems: Embedded MFP firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web interface functionality. Exact model lists available in vendor advisories.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical reboot, causing service disruption and potential data loss during printing/scanning operations.

🟠

Likely Case

Temporary denial of service affecting printing/scanning capabilities until device is manually rebooted.

🟢

If Mitigated

Minimal impact if devices are isolated from untrusted networks and patched promptly.

🌐 Internet-Facing: HIGH - Directly exploitable via HTTP requests without authentication if devices are exposed to internet.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised internal systems, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted HTTP requests to device web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates specified in vendor advisories

Vendor Advisory: https://global.sharp/products/copier/info/info_security_2024-10.html

Restart Required: Yes

Instructions:

1. Check vendor advisories for affected models. 2. Download firmware updates from vendor support portals. 3. Apply firmware updates following vendor instructions. 4. Reboot devices after update completion.

🔧 Temporary Workarounds

Network segmentation

all

Isolate MFPs from untrusted networks and restrict access to management interfaces

Access control

all

Implement firewall rules to restrict HTTP access to MFP management interfaces

🧯 If You Can't Patch

  • Segment MFPs on isolated VLANs with strict access controls
  • Disable unnecessary web interface features if supported

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vendor advisory lists

Check Version:

Check via device web interface or vendor management tools

Verify Fix Applied:

Verify firmware version matches patched versions in vendor advisories

📡 Detection & Monitoring

Log Indicators:

  • Multiple HTTP requests with malformed parameters to MFP web interface
  • Device reboot logs following web interface access

Network Indicators:

  • HTTP requests with unusual keyword search parameters
  • Malformed SOAP messages to MFP endpoints

SIEM Query:

source_ip=MFP_IP AND (http_uri CONTAINS 'search' OR http_content CONTAINS 'SOAP') AND http_status=500

🔗 References

📤 Share & Export