Search criteria

8 vulnerabilities found for e-studio-232 by toshibatec

VAR-201404-0194

Vulnerability from variot - Updated: 2023-12-18 13:34

Cross-site request forgery (CSRF) vulnerability in TopAccess (aka the web-based management utility) on TOSHIBA TEC e-Studio 232, 233, 282, and 283 devices allows remote attackers to hijack the authentication of administrators for requests that change passwords. e-Studio provided by TOSHIBA TEC CORPORATION is a multi-function peripheral (MFP). As a result, a remote attacker may obtain the document assets such as scan data. TOSHIBA e-Studio is prone to a cross-site request-forgery vulnerability. Exploiting the issue will allow a remote attacker to use a victim's currently active session to change the victim's password. Successful exploits will compromise affected computers. TOSHIBA TEC e-Studio 232, 233, 282 and 283 are all printing and copying all-in-one products of Japan's Toshiba (TOSHIBA). TopAccess (also known as Web-based management tool) is the network management software used in these products

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201404-0194",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "e-studio-282",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-283",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-233",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-232",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio 232",
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": null
      },
      {
        "model": "e-studio 233",
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": null
      },
      {
        "model": "e-studio 282",
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": null
      },
      {
        "model": "e-studio 283",
        "scope": null,
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000038"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-392"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-282:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-232:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-233:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-283:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-1990"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Hubert Gradek",
    "sources": [
      {
        "db": "BID",
        "id": "63713"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-1990",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 4.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2014-000038",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-69929",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-1990",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2014-000038",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201404-392",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-69929",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-69929"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000038"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-392"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site request forgery (CSRF) vulnerability in TopAccess (aka the web-based management utility) on TOSHIBA TEC e-Studio 232, 233, 282, and 283 devices allows remote attackers to hijack the authentication of administrators for requests that change passwords. e-Studio provided by TOSHIBA TEC CORPORATION is a multi-function peripheral (MFP). As a result, a remote attacker may obtain the document assets such as scan data. TOSHIBA e-Studio is prone to a cross-site request-forgery vulnerability. \nExploiting the issue will allow a remote attacker to use a victim\u0027s currently active session to change the victim\u0027s password. Successful exploits will compromise affected computers. TOSHIBA TEC e-Studio 232, 233, 282 and 283 are all printing and copying all-in-one products of Japan\u0027s Toshiba (TOSHIBA). TopAccess (also known as Web-based management tool) is the network management software used in these products",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-1990"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000038"
      },
      {
        "db": "BID",
        "id": "63713"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69929"
      }
    ],
    "trust": 1.98
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-69929",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-69929"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-1990",
        "trust": 2.8
      },
      {
        "db": "JVN",
        "id": "JVN13313061",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000038",
        "trust": 2.5
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-392",
        "trust": 0.7
      },
      {
        "db": "JVN",
        "id": "JVN#13313061",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "63713",
        "trust": 0.4
      },
      {
        "db": "EXPLOIT-DB",
        "id": "29570",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-83062",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-69929",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-69929"
      },
      {
        "db": "BID",
        "id": "63713"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000038"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-392"
      }
    ]
  },
  "id": "VAR-201404-0194",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-69929"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:34:39.063000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "TOSHIBA TEC CORPORATION website",
        "trust": 0.8,
        "url": "http://www.toshibatec.co.jp/page.jsp?id=4224"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000038"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-69929"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000038"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1990"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://jvn.jp/en/jp/jvn13313061/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.toshibatec.co.jp/page.jsp?id=4224"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2014-000038"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1990"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1990"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-69929"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000038"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-392"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-69929"
      },
      {
        "db": "BID",
        "id": "63713"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000038"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-392"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-04-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-69929"
      },
      {
        "date": "2013-10-02T00:00:00",
        "db": "BID",
        "id": "63713"
      },
      {
        "date": "2014-04-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-000038"
      },
      {
        "date": "2014-04-19T19:55:07.717000",
        "db": "NVD",
        "id": "CVE-2014-1990"
      },
      {
        "date": "2014-04-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201404-392"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-04-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-69929"
      },
      {
        "date": "2014-04-22T14:58:00",
        "db": "BID",
        "id": "63713"
      },
      {
        "date": "2014-04-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-000038"
      },
      {
        "date": "2014-04-21T19:23:39.973000",
        "db": "NVD",
        "id": "CVE-2014-1990"
      },
      {
        "date": "2014-04-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201404-392"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-392"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "TOSHIBA TEC e-Studio series vulnerable to cross-site request forgery",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000038"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-392"
      }
    ],
    "trust": 0.6
  }
}

VAR-201204-0222

Vulnerability from variot - Updated: 2023-12-18 12:52

The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors. Multiple e-Studio series products provided by TOSHIBA TEC CORPORATION contain an authentication bypass vulnerability. e-Studio is a multi-function peripheral (MFP). Multiple e-Studio series products contain a vulnerability in web-based management utility, which may result in an authentication bypass.An attacker that can access the product may log in with administrative privileges. As a result, settings may be changed and credential information may be viewed. Multiple Toshiba e-Studio devices are prone to a security-bypass vulnerability. Successful exploits will allow attackers to bypass certain security restrictions and gain access in the context of the device. A remote attacker can exploit this vulnerability to bypass authentication with an unknown vector and obtain administrator-level privileges

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201204-0222",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "e-studio-850",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": "t390sy0j354"
      },
      {
        "model": "e-studio-855",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": "t100sy0j302"
      },
      {
        "model": "e-studio-207 with network printer kit",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": "t282cn0j421"
      },
      {
        "model": "e-studio-181 with network printer kit",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": "t282cn0j421"
      },
      {
        "model": "e-studio-167 with network printer kit",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": "t282cn0j421"
      },
      {
        "model": "e-studio-655",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": "t100sy0j302"
      },
      {
        "model": "e-studio-tf-182 with network printer kit",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": "t282cn0j421"
      },
      {
        "model": "e-studio-755",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": "t100sy0j302"
      },
      {
        "model": "e-studio-720",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": "t390sy0j354"
      },
      {
        "model": "e-studio-182 with network printer kit",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "toshibatec",
        "version": "t282cn0j421"
      },
      {
        "model": "e-studio-352",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-281c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-6530c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t430sy0j302"
      },
      {
        "model": "e-studio-355",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-6520c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-3510c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t380sy0j354"
      },
      {
        "model": "e-studio-452",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t364sy0j354"
      },
      {
        "model": "e-studio-2500c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-2500c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t380sy0j354"
      },
      {
        "model": "e-studio-4520c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t450sy0j302"
      },
      {
        "model": "e-studio-755",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-3510c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-2830c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t450sy0j302"
      },
      {
        "model": "e-studio-255p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t470sy0j302"
      },
      {
        "model": "e-studio-600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-352",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t364sy0j354"
      },
      {
        "model": "e-studio-5520c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t430sy0j302"
      },
      {
        "model": "e-studio-351c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-355",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t470sy0j302"
      },
      {
        "model": "e-studio-3520c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t450sy0j302"
      },
      {
        "model": "e-studio-3500c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-2330c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t450sy0j302"
      },
      {
        "model": "e-studio-2330c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-850",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-4520c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-232",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-181 with network printer kit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-451c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t410sy0j354"
      },
      {
        "model": "e-studio-855",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-232",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t377sy0j354"
      },
      {
        "model": "e-studio-5520c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-455",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t470sy0j302"
      },
      {
        "model": "e-studio-255",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-167 with network printer kit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-6530c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-255p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t390sy0j354"
      },
      {
        "model": "e-studio-451c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-452",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-282",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-255",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t470sy0j302"
      },
      {
        "model": "e-studio-351c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t410sy0j354"
      },
      {
        "model": "e-studio-tf-182 with network printer kit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-3520c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-655",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-182 with network printer kit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-3500c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t380sy0j354"
      },
      {
        "model": "e-studio-6520c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t430sy0j302"
      },
      {
        "model": "e-studio-2830c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-207 with network printer kit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-720",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-282",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t377sy0j354"
      },
      {
        "model": "e-studio-455",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": null
      },
      {
        "model": "e-studio-281c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "toshibatec",
        "version": "t410sy0j354"
      },
      {
        "model": "e-studio 167 with network printer kit",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t282cn0j421"
      },
      {
        "model": "e-studio 181 with network printer kit",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t282cn0j421"
      },
      {
        "model": "e-studio 182 with network printer kit",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t282cn0j421"
      },
      {
        "model": "e-studio 207 with network printer kit",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t282cn0j421"
      },
      {
        "model": "e-studio 232",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t377sy0j354"
      },
      {
        "model": "e-studio 2330c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t450sy0j302"
      },
      {
        "model": "e-studio 2500c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t380sy0j354"
      },
      {
        "model": "e-studio 255",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t470sy0j302"
      },
      {
        "model": "e-studio 255p",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t470sy0j302"
      },
      {
        "model": "e-studio 281c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t410sy0j354"
      },
      {
        "model": "e-studio 282",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t377sy0j354"
      },
      {
        "model": "e-studio 2830c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t450sy0j302"
      },
      {
        "model": "e-studio 3500c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t380sy0j354"
      },
      {
        "model": "e-studio 3510c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t380sy0j354"
      },
      {
        "model": "e-studio 351c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t410sy0j354"
      },
      {
        "model": "e-studio 352",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t364sy0j354"
      },
      {
        "model": "e-studio 3520c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t450sy0j302"
      },
      {
        "model": "e-studio 355",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t470sy0j302"
      },
      {
        "model": "e-studio 451c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t410sy0j354"
      },
      {
        "model": "e-studio 452",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t364sy0j354"
      },
      {
        "model": "e-studio 4520c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t450sy0j302"
      },
      {
        "model": "e-studio 455",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t470sy0j302"
      },
      {
        "model": "e-studio 5520c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t430sy0j302"
      },
      {
        "model": "e-studio 600",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t390sy0j354"
      },
      {
        "model": "e-studio 6520c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t430sy0j302"
      },
      {
        "model": "e-studio 6530c",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t430sy0j302"
      },
      {
        "model": "e-studio 655",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t100sy0j302"
      },
      {
        "model": "e-studio 720",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t390sy0j354"
      },
      {
        "model": "e-studio 755",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t100sy0j302"
      },
      {
        "model": "e-studio 850",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t390sy0j354"
      },
      {
        "model": "e-studio 855",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t100sy0j302"
      },
      {
        "model": "tf-182 with network printer kit",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "toshiba tec",
        "version": "t282cn0j421"
      },
      {
        "model": "e-studio855",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "0"
      },
      {
        "model": "e-studio755",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "0"
      },
      {
        "model": "e-studio655",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "0"
      },
      {
        "model": "e-studio555",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "0"
      },
      {
        "model": "e-studio455",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "0"
      },
      {
        "model": "e-studio355",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "0"
      },
      {
        "model": "e-studio305",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "0"
      },
      {
        "model": "e-studio255",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "0"
      },
      {
        "model": "e-studio182",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "toshiba",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "50168"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000028"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1239"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-087"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-5520c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-6520c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-6530c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-232:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-282:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-167_with_network_printer_kit:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-207_with_network_printer_kit:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-181_with_network_printer_kit:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-182_with_network_printer_kit:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-6530c_firmware:t430sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-232_firmware:t377sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-282_firmware:t377sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-352_firmware:t364sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-207_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-181_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-182_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-tf-182_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-351c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-2330c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-3520c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-352:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-255:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-655:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-855:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-tf-182_with_network_printer_kit:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-351c_firmware:t410sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-3520c_firmware:t450sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-5520c_firmware:t430sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-255_firmware:t470sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-355_firmware:t470sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-655_firmware:t100sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-855_firmware:t100sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-451c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-2500c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-3500c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-3510c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-355:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-455:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-600:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-720:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-2500c_firmware:t380sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-3510c_firmware:t380sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-3500c_firmware:t380sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-2330c_firmware:t450sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-2830c_firmware:t450sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-455_firmware:t470sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-600_firmware:t390sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-720_firmware:t390sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-850_firmware:t390sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-281c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-2830c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-4520c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-452:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-255p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-850:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:toshibatec:e-studio-755:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-281c_firmware:t410sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-451c_firmware:t410sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-4520c_firmware:t450sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-6520c_firmware:t430sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-452_firmware:t364sy0j354:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-255p_firmware:t470sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-755_firmware:t100sy0j302:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:toshibatec:e-studio-167_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-1239"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Deral Heiland PercX",
    "sources": [
      {
        "db": "BID",
        "id": "50168"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-392"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2012-1239",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 6.4,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2012-000028",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-54520",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-1239",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2012-000028",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201204-087",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-54520",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-54520"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000028"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1239"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-087"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors. Multiple e-Studio series products provided by TOSHIBA TEC CORPORATION contain an authentication bypass vulnerability. e-Studio is a multi-function peripheral (MFP). Multiple e-Studio series products contain a vulnerability in web-based management utility, which may result in an authentication bypass.An attacker that can access the product may log in with administrative privileges. As a result, settings may be changed and credential information may be viewed. Multiple Toshiba e-Studio devices are prone to a security-bypass vulnerability. \nSuccessful exploits will allow attackers to bypass certain security restrictions and gain access in the context of the device. A remote attacker can exploit this vulnerability to bypass authentication with an unknown vector and obtain administrator-level privileges",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-1239"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000028"
      },
      {
        "db": "BID",
        "id": "50168"
      },
      {
        "db": "VULHUB",
        "id": "VHN-54520"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000028",
        "trust": 2.8
      },
      {
        "db": "JVN",
        "id": "JVN92830293",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1239",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "50168",
        "trust": 1.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-087",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-392",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#92830293",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "36238",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-54520",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-54520"
      },
      {
        "db": "BID",
        "id": "50168"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000028"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1239"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-392"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-087"
      }
    ]
  },
  "id": "VAR-201204-0222",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-54520"
      }
    ],
    "trust": 0.7666666999999999
  },
  "last_update_date": "2023-12-18T12:52:18.494000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "About a vulnerability in TOSHIBA TEC digital MFP web-based management utility",
        "trust": 0.8,
        "url": "http://www.toshibatec.co.jp/information/2012/20120405/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000028"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-287",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-54520"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000028"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1239"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://jvn.jp/en/jp/jvn92830293/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.toshibatec.co.jp/information/2012/20120405/"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2012-000028"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1239"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1239"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/50168"
      },
      {
        "trust": 0.3,
        "url": "http://www.eid.toshiba.com.au/n_mono_search.asp"
      },
      {
        "trust": 0.3,
        "url": "http://jvndb.jvn.jp/en/contents/2012/jvndb-2012-000028.html"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-54520"
      },
      {
        "db": "BID",
        "id": "50168"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000028"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1239"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-392"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-087"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-54520"
      },
      {
        "db": "BID",
        "id": "50168"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000028"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1239"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-392"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-087"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-04-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-54520"
      },
      {
        "date": "2011-10-17T00:00:00",
        "db": "BID",
        "id": "50168"
      },
      {
        "date": "2012-04-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-000028"
      },
      {
        "date": "2012-04-06T19:55:01.480000",
        "db": "NVD",
        "id": "CVE-2012-1239"
      },
      {
        "date": "1900-01-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201110-392"
      },
      {
        "date": "2012-04-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201204-087"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-04-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-54520"
      },
      {
        "date": "2012-04-05T20:30:00",
        "db": "BID",
        "id": "50168"
      },
      {
        "date": "2012-04-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-000028"
      },
      {
        "date": "2012-04-09T04:00:00",
        "db": "NVD",
        "id": "CVE-2012-1239"
      },
      {
        "date": "2011-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201110-392"
      },
      {
        "date": "2012-04-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201204-087"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-392"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-087"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "TOSHIBA TEC e-Studio series vulnerable to authentication bypass",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000028"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-392"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-087"
      }
    ],
    "trust": 1.2
  }
}

FKIE_CVE-2014-1990

Vulnerability from fkie_nvd - Published: 2014-04-19 19:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in TopAccess (aka the web-based management utility) on TOSHIBA TEC e-Studio 232, 233, 282, and 283 devices allows remote attackers to hijack the authentication of administrators for requests that change passwords.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-232:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FD09538-0F14-43A1-A9C6-5ED1B2F79949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-233:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "820E652A-8306-483D-9FC0-B002FB0E98DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C7C9D0-F0F6-49B3-8FDB-1DF93801469C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-283:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7226D0E-4872-468C-8D00-0860B58DD17F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in TopAccess (aka the web-based management utility) on TOSHIBA TEC e-Studio 232, 233, 282, and 283 devices allows remote attackers to hijack the authentication of administrators for requests that change passwords."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de CSRF en TopAccess (tambi\u00e9n conocido como la utilidad de gesti\u00f3n basada en web) en dispositivos TOSHIBA TEC e-Studio 232, 233, 282 y 283 permite a atacantes remotos secuestrar la autenticaci\u00f3n de administradores para solicitudes que cambian contrase\u00f1as."
    }
  ],
  "id": "CVE-2014-1990",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-04-19T19:55:07.717",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN13313061/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000038"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://www.toshibatec.co.jp/page.jsp?id=4224"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN13313061/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.toshibatec.co.jp/page.jsp?id=4224"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-1239

Vulnerability from fkie_nvd - Published: 2012-04-06 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors.
Impacted products
Vendor Product Version
toshibatec e-studio-167_with_network_printer_kit_firmware t282cn0j421
toshibatec e-studio-181_with_network_printer_kit_firmware t282cn0j421
toshibatec e-studio-182_with_network_printer_kit_firmware t282cn0j421
toshibatec e-studio-207_with_network_printer_kit_firmware t282cn0j421
toshibatec e-studio-232_firmware t377sy0j354
toshibatec e-studio-2330c_firmware t450sy0j302
toshibatec e-studio-2500c_firmware t380sy0j354
toshibatec e-studio-255_firmware t470sy0j302
toshibatec e-studio-255p_firmware t470sy0j302
toshibatec e-studio-281c_firmware t410sy0j354
toshibatec e-studio-282_firmware t377sy0j354
toshibatec e-studio-2830c_firmware t450sy0j302
toshibatec e-studio-3500c_firmware t380sy0j354
toshibatec e-studio-3510c_firmware t380sy0j354
toshibatec e-studio-351c_firmware t410sy0j354
toshibatec e-studio-352_firmware t364sy0j354
toshibatec e-studio-3520c_firmware t450sy0j302
toshibatec e-studio-355_firmware t470sy0j302
toshibatec e-studio-451c_firmware t410sy0j354
toshibatec e-studio-452_firmware t364sy0j354
toshibatec e-studio-4520c_firmware t450sy0j302
toshibatec e-studio-455_firmware t470sy0j302
toshibatec e-studio-5520c_firmware t430sy0j302
toshibatec e-studio-600_firmware t390sy0j354
toshibatec e-studio-6520c_firmware t430sy0j302
toshibatec e-studio-6530c_firmware t430sy0j302
toshibatec e-studio-655_firmware t100sy0j302
toshibatec e-studio-720_firmware t390sy0j354
toshibatec e-studio-755_firmware t100sy0j302
toshibatec e-studio-850_firmware t390sy0j354
toshibatec e-studio-855_firmware t100sy0j302
toshibatec e-studio-tf-182_with_network_printer_kit_firmware t282cn0j421
toshibatec e-studio-167_with_network_printer_kit -
toshibatec e-studio-181_with_network_printer_kit -
toshibatec e-studio-182_with_network_printer_kit -
toshibatec e-studio-207_with_network_printer_kit -
toshibatec e-studio-232 -
toshibatec e-studio-2330c -
toshibatec e-studio-2500c -
toshibatec e-studio-255 -
toshibatec e-studio-255p -
toshibatec e-studio-281c -
toshibatec e-studio-282 -
toshibatec e-studio-2830c -
toshibatec e-studio-3500c -
toshibatec e-studio-3510c -
toshibatec e-studio-351c -
toshibatec e-studio-352 -
toshibatec e-studio-3520c -
toshibatec e-studio-355 -
toshibatec e-studio-451c -
toshibatec e-studio-452 -
toshibatec e-studio-4520c -
toshibatec e-studio-455 -
toshibatec e-studio-5520c -
toshibatec e-studio-600 -
toshibatec e-studio-6520c -
toshibatec e-studio-6530c -
toshibatec e-studio-655 -
toshibatec e-studio-720 -
toshibatec e-studio-755 -
toshibatec e-studio-850 -
toshibatec e-studio-855 -
toshibatec e-studio-tf-182_with_network_printer_kit -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-167_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
              "matchCriteriaId": "E11D49ED-102B-4115-8FF8-C299C200824E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-181_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
              "matchCriteriaId": "70DF871B-3525-4318-9CAC-37F68E1DF15E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-182_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F13F745-3EFC-48D5-B15B-496246911B3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-207_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
              "matchCriteriaId": "866DE97F-B265-4477-BF06-F9A9C5E70BBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-232_firmware:t377sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "524188F5-DF4D-43B7-9BAB-B78F3B620F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-2330c_firmware:t450sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DC387E1-6024-46AA-AE85-13EC2B309D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-2500c_firmware:t380sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "54CF514F-8402-47EE-B316-F77264869BB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-255_firmware:t470sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "F79E4B54-9F08-432E-A4A1-50704D4E3CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-255p_firmware:t470sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E2F4CCE-DFBD-4D31-8C04-F83CED9430A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-281c_firmware:t410sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB430243-CD1F-4037-A87E-587B12B15EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-282_firmware:t377sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F88A79F-65A8-4ACC-AA84-D1C2CC85E0A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-2830c_firmware:t450sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "170D374D-233A-4745-BCD5-9E2801E2D4E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-3500c_firmware:t380sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5B05ED9-C726-47AE-9D52-659ECAF89709",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-3510c_firmware:t380sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "21C20ADE-284F-4185-BBA7-10A48557D41C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-351c_firmware:t410sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "80B592D7-33A4-4C11-8893-3738A224EDB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-352_firmware:t364sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF01907-CB99-41D5-AC92-CA945711CB22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-3520c_firmware:t450sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC6B51A9-3EC5-4DAF-96BB-EBA1EE235CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-355_firmware:t470sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "0039FFC2-0A94-4E93-B13F-AAC88EE9173D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-451c_firmware:t410sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "059FABAA-D880-4291-BAB4-3D5683F45CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-452_firmware:t364sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE60140E-0CB6-424F-950E-CDED1563198E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-4520c_firmware:t450sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD18804C-5754-4D80-8C6B-365BB10E1B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-455_firmware:t470sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3FD52C2-3A88-486E-9BCE-EE2C4008BE20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-5520c_firmware:t430sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "3257567F-49BB-4997-8943-76BDF1292817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-600_firmware:t390sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A6BFE7D-91BC-4176-96E0-8FF30F55CEF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-6520c_firmware:t430sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD11479-4227-4D56-923D-1AAC3902FED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-6530c_firmware:t430sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "405A2ADC-A846-467B-BE7B-BE6D1BF3696D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-655_firmware:t100sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B77488-93A6-4B66-9954-EBFF4C239A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-720_firmware:t390sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "0717A791-0CFF-4286-8A7D-96B554163CC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-755_firmware:t100sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D22D42D-8861-4DD1-9DD3-44075AB0BB30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-850_firmware:t390sy0j354:*:*:*:*:*:*:*",
              "matchCriteriaId": "70D3BE89-9763-496A-8FBD-30E1E21C9966",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-855_firmware:t100sy0j302:*:*:*:*:*:*:*",
              "matchCriteriaId": "791746A2-F364-4BC6-95A3-CB890EBE81D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:toshibatec:e-studio-tf-182_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
              "matchCriteriaId": "5294B15E-969F-47AB-9A01-B533A110310C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-167_with_network_printer_kit:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7929750C-A63D-4C2B-BF52-4ABF846F78C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-181_with_network_printer_kit:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8540A917-65F3-4CC0-906B-1EE52FBD0991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-182_with_network_printer_kit:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24E7C0B1-55B2-4E8A-9F5B-55599597DF8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-207_with_network_printer_kit:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA7AC48F-7BD1-45CA-BF2C-C42CF21E356E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-232:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FD09538-0F14-43A1-A9C6-5ED1B2F79949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-2330c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C8AD83B-9C67-4296-A591-FB6D86666136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-2500c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8143FDA-0691-4C0E-B888-B25E8AD0344D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-255:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D44878F0-F147-42D0-8EC1-29B4275752AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-255p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5C6077A-0A11-47ED-84B1-EE73ED13CB55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-281c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F7CAF3D-77AD-426B-83F3-C1B264B04412",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C7C9D0-F0F6-49B3-8FDB-1DF93801469C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-2830c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD4B4189-11EF-46C3-9296-16391EE7AB50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-3500c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4341BB32-B954-4E20-A860-13EBA9E7A03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-3510c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0567C8D-E36E-4BCB-AC17-A892C53659DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-351c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15448ADA-85A1-4A30-ABDF-320F8E00E4E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2233B59-E23C-4021-8720-8F9ADD5E642F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-3520c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "592408A8-8929-42C0-924B-C2E4E7CFDA78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-355:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4F5F33B-543B-4197-AC11-3032A1610488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-451c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33ABE1A4-A01D-434E-9A26-FDD20A550216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB20F9D-8986-42CA-968C-1629B54AEDEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-4520c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44C8F053-CAD3-4ADC-8857-0A045BC97D97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-455:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00396CA-903B-4D08-BAE8-30EAE444E84B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-5520c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF7F23DC-EFE6-4E8E-8BA6-7EBE27509EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52F39BA-6388-49EB-85C0-A6C27A39905D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-6520c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "952AF649-C53F-43E4-B4BF-F4642627CF43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-6530c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A3F4289-9C8B-4E01-9004-6C4E9910A18B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-655:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC4EBD5E-852C-487D-B2E7-F3FC895CA6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-720:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD018AFB-BFF8-4D5F-9610-6FCA643FA42D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D40E27C-83CC-4A77-9BD6-1C430B8612D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44235B3A-6471-43CA-801D-5A2A233D0C4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB0525EC-BF65-4B29-9588-FFEED739CEAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:toshibatec:e-studio-tf-182_with_network_printer_kit:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C657937-9AAC-4307-8FDD-18CEB9EE8036",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "La interfaz de gesti\u00f3n TopAccess basada en web en los dispositivos perif\u00e9ricos multifuncionales (MFP) TOSHIBA TEC e-Studio  con firmware desde v30x hasta  v302, desde v35x hasta v354, y v4xx hasta v421 permite a atacantes remotos eludir la autenticaci\u00f3n y obtener privilegios de administrador a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2012-1239",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-04-06T19:55:01.480",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN92830293/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://www.toshibatec.co.jp/information/2012/20120405/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN92830293/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.toshibatec.co.jp/information/2012/20120405/"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-1990 (GCVE-0-2014-1990)

Vulnerability from cvelistv5 – Published: 2014-04-19 19:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in TopAccess (aka the web-based management utility) on TOSHIBA TEC e-Studio 232, 233, 282, and 283 devices allows remote attackers to hijack the authentication of administrators for requests that change passwords.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.toshibatec.co.jp/page.jsp?id=4224 x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000038 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN13313061/index.html third-party-advisoryx_refsource_JVN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:15.825Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.toshibatec.co.jp/page.jsp?id=4224"
          },
          {
            "name": "JVNDB-2014-000038",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000038"
          },
          {
            "name": "JVN#13313061",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN13313061/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in TopAccess (aka the web-based management utility) on TOSHIBA TEC e-Studio 232, 233, 282, and 283 devices allows remote attackers to hijack the authentication of administrators for requests that change passwords."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-04-19T19:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.toshibatec.co.jp/page.jsp?id=4224"
        },
        {
          "name": "JVNDB-2014-000038",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000038"
        },
        {
          "name": "JVN#13313061",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN13313061/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-1990",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in TopAccess (aka the web-based management utility) on TOSHIBA TEC e-Studio 232, 233, 282, and 283 devices allows remote attackers to hijack the authentication of administrators for requests that change passwords."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.toshibatec.co.jp/page.jsp?id=4224",
              "refsource": "CONFIRM",
              "url": "http://www.toshibatec.co.jp/page.jsp?id=4224"
            },
            {
              "name": "JVNDB-2014-000038",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000038"
            },
            {
              "name": "JVN#13313061",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN13313061/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-1990",
    "datePublished": "2014-04-19T19:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:15.825Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1239 (GCVE-0-2012-1239)

Vulnerability from cvelistv5 – Published: 2012-04-06 19:00 – Updated: 2024-09-17 00:07
VLAI?
Summary
The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN92830293/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028 third-party-advisoryx_refsource_JVNDB
http://www.toshibatec.co.jp/information/2012/20120405/ x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:53:36.470Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#92830293",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN92830293/index.html"
          },
          {
            "name": "JVNDB-2012-000028",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.toshibatec.co.jp/information/2012/20120405/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-04-06T19:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#92830293",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN92830293/index.html"
        },
        {
          "name": "JVNDB-2012-000028",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.toshibatec.co.jp/information/2012/20120405/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2012-1239",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#92830293",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN92830293/index.html"
            },
            {
              "name": "JVNDB-2012-000028",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
            },
            {
              "name": "http://www.toshibatec.co.jp/information/2012/20120405/",
              "refsource": "CONFIRM",
              "url": "http://www.toshibatec.co.jp/information/2012/20120405/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2012-1239",
    "datePublished": "2012-04-06T19:00:00Z",
    "dateReserved": "2012-02-21T00:00:00Z",
    "dateUpdated": "2024-09-17T00:07:00.113Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-1990 (GCVE-0-2014-1990)

Vulnerability from nvd – Published: 2014-04-19 19:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in TopAccess (aka the web-based management utility) on TOSHIBA TEC e-Studio 232, 233, 282, and 283 devices allows remote attackers to hijack the authentication of administrators for requests that change passwords.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.toshibatec.co.jp/page.jsp?id=4224 x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000038 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN13313061/index.html third-party-advisoryx_refsource_JVN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:15.825Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.toshibatec.co.jp/page.jsp?id=4224"
          },
          {
            "name": "JVNDB-2014-000038",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000038"
          },
          {
            "name": "JVN#13313061",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN13313061/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in TopAccess (aka the web-based management utility) on TOSHIBA TEC e-Studio 232, 233, 282, and 283 devices allows remote attackers to hijack the authentication of administrators for requests that change passwords."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-04-19T19:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.toshibatec.co.jp/page.jsp?id=4224"
        },
        {
          "name": "JVNDB-2014-000038",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000038"
        },
        {
          "name": "JVN#13313061",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN13313061/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-1990",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in TopAccess (aka the web-based management utility) on TOSHIBA TEC e-Studio 232, 233, 282, and 283 devices allows remote attackers to hijack the authentication of administrators for requests that change passwords."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.toshibatec.co.jp/page.jsp?id=4224",
              "refsource": "CONFIRM",
              "url": "http://www.toshibatec.co.jp/page.jsp?id=4224"
            },
            {
              "name": "JVNDB-2014-000038",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000038"
            },
            {
              "name": "JVN#13313061",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN13313061/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-1990",
    "datePublished": "2014-04-19T19:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:15.825Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1239 (GCVE-0-2012-1239)

Vulnerability from nvd – Published: 2012-04-06 19:00 – Updated: 2024-09-17 00:07
VLAI?
Summary
The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN92830293/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028 third-party-advisoryx_refsource_JVNDB
http://www.toshibatec.co.jp/information/2012/20120405/ x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:53:36.470Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#92830293",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN92830293/index.html"
          },
          {
            "name": "JVNDB-2012-000028",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.toshibatec.co.jp/information/2012/20120405/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-04-06T19:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#92830293",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN92830293/index.html"
        },
        {
          "name": "JVNDB-2012-000028",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.toshibatec.co.jp/information/2012/20120405/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2012-1239",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#92830293",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN92830293/index.html"
            },
            {
              "name": "JVNDB-2012-000028",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
            },
            {
              "name": "http://www.toshibatec.co.jp/information/2012/20120405/",
              "refsource": "CONFIRM",
              "url": "http://www.toshibatec.co.jp/information/2012/20120405/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2012-1239",
    "datePublished": "2012-04-06T19:00:00Z",
    "dateReserved": "2012-02-21T00:00:00Z",
    "dateUpdated": "2024-09-17T00:07:00.113Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}