Toshiba printers will display the password of the admin user in clear-text and additional passwords when sending 2 specific HTTP requests to the internal API. An attacker stealing the cookie of an admin or abusing a XSS vulnerability can recover this password in clear-text and compromise the printer. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Toshiba
Published: 2024-06-14T03:40:44.063Z
Updated: 2024-06-14T03:40:44.063Z
Reserved: 2024-02-21T02:11:59.651Z
Link: CVE-2024-27163
JSON object: View
NVD Information
Status : Awaiting Analysis
Published: 2024-06-14T04:15:32.067
Modified: 2024-06-17T12:42:04.623
Link: CVE-2024-27163
JSON object: View
Redhat Information
No data.
CWE