CVE-2024-47801

7.4 HIGH

📋 TL;DR

Sharp and Toshiba Tec multifunction printers (MFPs) have a reflected cross-site scripting vulnerability where specially crafted URLs can execute malicious scripts in users' browsers. This affects organizations using vulnerable Sharp and Toshiba Tec MFP models with web interfaces accessible to users.

💻 Affected Systems

Products:
  • Sharp MFPs
  • Toshiba Tec MFPs
Versions: Specific models listed in vendor advisories (check references for exact models)
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects models with web management interfaces. Exact model lists available in vendor advisories.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to phishing sites, or perform actions on behalf of authenticated users, potentially leading to data theft or unauthorized device access.

🟠

Likely Case

Attackers craft malicious links that, when clicked by users, execute scripts in their browsers to steal session cookies or redirect to phishing pages.

🟢

If Mitigated

With proper network segmentation and user awareness training, impact is limited to isolated incidents affecting individual users rather than system-wide compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS requires user interaction (clicking malicious link) but requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates specified in vendor advisories

Vendor Advisory: https://global.sharp/products/copier/info/info_security_2024-10.html

Restart Required: Yes

Instructions:

1. Check vendor advisories for affected models. 2. Download firmware updates from vendor support sites. 3. Apply firmware updates following vendor instructions. 4. Verify update completion.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to MFP web interfaces to trusted networks only

Web Application Firewall

all

Deploy WAF with XSS protection rules to block malicious requests

🧯 If You Can't Patch

  • Isolate MFPs on separate VLAN with restricted access
  • Implement strict Content Security Policy headers if supported

🔍 How to Verify

Check if Vulnerable:

Check MFP model and firmware version against vendor advisories. Test with safe XSS payloads in query parameters.

Check Version:

Check via MFP web interface: Settings > System > Firmware Version

Verify Fix Applied:

Verify firmware version matches patched version in vendor advisory. Retest with XSS payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual query parameters in HTTP logs
  • Multiple failed XSS attempts

Network Indicators:

  • HTTP requests with suspicious script tags in query parameters
  • Unusual traffic to MFP web interfaces

SIEM Query:

source="mfp_web_logs" AND (url="*<script>*" OR url="*javascript:*")

🔗 References

📤 Share & Export