Search criteria
3 vulnerabilities found for e-studio-452_firmware by toshibatec
FKIE_CVE-2012-1239
Vulnerability from fkie_nvd - Published: 2012-04-06 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-167_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
"matchCriteriaId": "E11D49ED-102B-4115-8FF8-C299C200824E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-181_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
"matchCriteriaId": "70DF871B-3525-4318-9CAC-37F68E1DF15E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-182_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
"matchCriteriaId": "6F13F745-3EFC-48D5-B15B-496246911B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-207_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
"matchCriteriaId": "866DE97F-B265-4477-BF06-F9A9C5E70BBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-232_firmware:t377sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "524188F5-DF4D-43B7-9BAB-B78F3B620F6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-2330c_firmware:t450sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC387E1-6024-46AA-AE85-13EC2B309D86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-2500c_firmware:t380sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "54CF514F-8402-47EE-B316-F77264869BB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-255_firmware:t470sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "F79E4B54-9F08-432E-A4A1-50704D4E3CBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-255p_firmware:t470sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "2E2F4CCE-DFBD-4D31-8C04-F83CED9430A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-281c_firmware:t410sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "DB430243-CD1F-4037-A87E-587B12B15EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-282_firmware:t377sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "3F88A79F-65A8-4ACC-AA84-D1C2CC85E0A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-2830c_firmware:t450sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "170D374D-233A-4745-BCD5-9E2801E2D4E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-3500c_firmware:t380sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B05ED9-C726-47AE-9D52-659ECAF89709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-3510c_firmware:t380sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "21C20ADE-284F-4185-BBA7-10A48557D41C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-351c_firmware:t410sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "80B592D7-33A4-4C11-8893-3738A224EDB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-352_firmware:t364sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF01907-CB99-41D5-AC92-CA945711CB22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-3520c_firmware:t450sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6B51A9-3EC5-4DAF-96BB-EBA1EE235CD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-355_firmware:t470sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "0039FFC2-0A94-4E93-B13F-AAC88EE9173D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-451c_firmware:t410sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "059FABAA-D880-4291-BAB4-3D5683F45CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-452_firmware:t364sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "FE60140E-0CB6-424F-950E-CDED1563198E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-4520c_firmware:t450sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "DD18804C-5754-4D80-8C6B-365BB10E1B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-455_firmware:t470sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "C3FD52C2-3A88-486E-9BCE-EE2C4008BE20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-5520c_firmware:t430sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "3257567F-49BB-4997-8943-76BDF1292817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-600_firmware:t390sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "4A6BFE7D-91BC-4176-96E0-8FF30F55CEF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-6520c_firmware:t430sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "5BD11479-4227-4D56-923D-1AAC3902FED5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-6530c_firmware:t430sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "405A2ADC-A846-467B-BE7B-BE6D1BF3696D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-655_firmware:t100sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "61B77488-93A6-4B66-9954-EBFF4C239A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-720_firmware:t390sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "0717A791-0CFF-4286-8A7D-96B554163CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-755_firmware:t100sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "5D22D42D-8861-4DD1-9DD3-44075AB0BB30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-850_firmware:t390sy0j354:*:*:*:*:*:*:*",
"matchCriteriaId": "70D3BE89-9763-496A-8FBD-30E1E21C9966",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-855_firmware:t100sy0j302:*:*:*:*:*:*:*",
"matchCriteriaId": "791746A2-F364-4BC6-95A3-CB890EBE81D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:toshibatec:e-studio-tf-182_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*",
"matchCriteriaId": "5294B15E-969F-47AB-9A01-B533A110310C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-167_with_network_printer_kit:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7929750C-A63D-4C2B-BF52-4ABF846F78C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-181_with_network_printer_kit:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8540A917-65F3-4CC0-906B-1EE52FBD0991",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-182_with_network_printer_kit:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24E7C0B1-55B2-4E8A-9F5B-55599597DF8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-207_with_network_printer_kit:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA7AC48F-7BD1-45CA-BF2C-C42CF21E356E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-232:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD09538-0F14-43A1-A9C6-5ED1B2F79949",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-2330c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C8AD83B-9C67-4296-A591-FB6D86666136",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-2500c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8143FDA-0691-4C0E-B888-B25E8AD0344D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-255:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D44878F0-F147-42D0-8EC1-29B4275752AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-255p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5C6077A-0A11-47ED-84B1-EE73ED13CB55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-281c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F7CAF3D-77AD-426B-83F3-C1B264B04412",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80C7C9D0-F0F6-49B3-8FDB-1DF93801469C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-2830c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD4B4189-11EF-46C3-9296-16391EE7AB50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-3500c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4341BB32-B954-4E20-A860-13EBA9E7A03C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-3510c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0567C8D-E36E-4BCB-AC17-A892C53659DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-351c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15448ADA-85A1-4A30-ABDF-320F8E00E4E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-352:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2233B59-E23C-4021-8720-8F9ADD5E642F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-3520c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "592408A8-8929-42C0-924B-C2E4E7CFDA78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-355:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F5F33B-543B-4197-AC11-3032A1610488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-451c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33ABE1A4-A01D-434E-9A26-FDD20A550216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-452:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB20F9D-8986-42CA-968C-1629B54AEDEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-4520c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44C8F053-CAD3-4ADC-8857-0A045BC97D97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-455:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B00396CA-903B-4D08-BAE8-30EAE444E84B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-5520c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF7F23DC-EFE6-4E8E-8BA6-7EBE27509EC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E52F39BA-6388-49EB-85C0-A6C27A39905D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-6520c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "952AF649-C53F-43E4-B4BF-F4642627CF43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-6530c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A3F4289-9C8B-4E01-9004-6C4E9910A18B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-655:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC4EBD5E-852C-487D-B2E7-F3FC895CA6EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-720:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD018AFB-BFF8-4D5F-9610-6FCA643FA42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-755:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D40E27C-83CC-4A77-9BD6-1C430B8612D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44235B3A-6471-43CA-801D-5A2A233D0C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-855:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0525EC-BF65-4B29-9588-FFEED739CEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:toshibatec:e-studio-tf-182_with_network_printer_kit:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C657937-9AAC-4307-8FDD-18CEB9EE8036",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors."
},
{
"lang": "es",
"value": "La interfaz de gesti\u00f3n TopAccess basada en web en los dispositivos perif\u00e9ricos multifuncionales (MFP) TOSHIBA TEC e-Studio con firmware desde v30x hasta v302, desde v35x hasta v354, y v4xx hasta v421 permite a atacantes remotos eludir la autenticaci\u00f3n y obtener privilegios de administrador a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2012-1239",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-04-06T19:55:01.480",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN92830293/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://www.toshibatec.co.jp/information/2012/20120405/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN92830293/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.toshibatec.co.jp/information/2012/20120405/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2012-1239 (GCVE-0-2012-1239)
Vulnerability from cvelistv5 – Published: 2012-04-06 19:00 – Updated: 2024-09-17 00:07
VLAI?
Summary
The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:53:36.470Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#92830293",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN92830293/index.html"
},
{
"name": "JVNDB-2012-000028",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.toshibatec.co.jp/information/2012/20120405/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-04-06T19:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#92830293",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN92830293/index.html"
},
{
"name": "JVNDB-2012-000028",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.toshibatec.co.jp/information/2012/20120405/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-1239",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#92830293",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN92830293/index.html"
},
{
"name": "JVNDB-2012-000028",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
},
{
"name": "http://www.toshibatec.co.jp/information/2012/20120405/",
"refsource": "CONFIRM",
"url": "http://www.toshibatec.co.jp/information/2012/20120405/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-1239",
"datePublished": "2012-04-06T19:00:00Z",
"dateReserved": "2012-02-21T00:00:00Z",
"dateUpdated": "2024-09-17T00:07:00.113Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-1239 (GCVE-0-2012-1239)
Vulnerability from nvd – Published: 2012-04-06 19:00 – Updated: 2024-09-17 00:07
VLAI?
Summary
The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:53:36.470Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#92830293",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN92830293/index.html"
},
{
"name": "JVNDB-2012-000028",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.toshibatec.co.jp/information/2012/20120405/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-04-06T19:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#92830293",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN92830293/index.html"
},
{
"name": "JVNDB-2012-000028",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.toshibatec.co.jp/information/2012/20120405/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-1239",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#92830293",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN92830293/index.html"
},
{
"name": "JVNDB-2012-000028",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028"
},
{
"name": "http://www.toshibatec.co.jp/information/2012/20120405/",
"refsource": "CONFIRM",
"url": "http://www.toshibatec.co.jp/information/2012/20120405/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-1239",
"datePublished": "2012-04-06T19:00:00Z",
"dateReserved": "2012-02-21T00:00:00Z",
"dateUpdated": "2024-09-17T00:07:00.113Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}