CVE-2024-47005

8.1 HIGH

📋 TL;DR

This vulnerability allows non-administrative users to execute configuration APIs on Sharp and Toshiba Tec multifunction printers (MFPs) that should be restricted to administrators only. This exposes configuration management functions to unauthorized users. Organizations using affected Sharp and Toshiba Tec MFP models are impacted.

💻 Affected Systems

Products:
  • Sharp MFPs
  • Toshiba Tec MFPs
Versions: Specific models and firmware versions listed in vendor advisories
Operating Systems: Embedded printer OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific MFP models with the vulnerable firmware. Check vendor advisories for exact model numbers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could reconfigure device settings, disable security features, extract sensitive information, or potentially gain administrative access to the device.

🟠

Likely Case

Unauthorized users could modify printer settings, access configuration data, or disrupt normal device operations.

🟢

If Mitigated

With proper network segmentation and access controls, the impact would be limited to internal users who already have some level of network access to the devices.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the device and valid user credentials (non-admin). The vulnerability is in API authorization logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates specified in vendor advisories

Vendor Advisory: https://global.sharp/products/copier/info/info_security_2024-10.html

Restart Required: Yes

Instructions:

1. Identify affected MFP models using vendor advisories. 2. Download firmware updates from Sharp or Toshiba Tec support portals. 3. Apply firmware updates following manufacturer instructions. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate MFPs on separate VLANs with strict access controls

Access Control Lists

all

Implement firewall rules to restrict access to MFP management interfaces

🧯 If You Can't Patch

  • Segment MFPs on isolated network segments with strict access controls
  • Disable unnecessary management interfaces and APIs if possible
  • Implement strong authentication and monitor for unauthorized configuration changes

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vendor advisories. Test if non-admin users can access configuration APIs.

Check Version:

Check firmware version through device web interface or management console

Verify Fix Applied:

Verify firmware version has been updated to patched version. Test that non-admin users can no longer access configuration APIs.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized API calls to configuration endpoints
  • Configuration changes from non-admin users
  • Failed authentication attempts to admin APIs

Network Indicators:

  • Unusual traffic to MFP management ports from non-admin IPs
  • Configuration API calls from unauthorized users

SIEM Query:

source="mfp_logs" AND (event="configuration_change" OR api_call="*/config/*") AND user_role!="admin"

🔗 References

📤 Share & Export