CVE-2024-32151
Vulnerability from cvelistv5
Published
2024-11-26 07:37
Modified
2024-11-26 14:09
Severity ?
EPSS score ?
Summary
User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Sharp Corporation | Multiple MFPs (multifunction printers) |
Version: See the information provided by Sharp Corporation listed under [References] |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32151", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T14:03:23.265630Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T14:09:24.628Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Multiple MFPs (multifunction printers)", "vendor": "Sharp Corporation", "versions": [ { "status": "affected", "version": "See the information provided by Sharp Corporation listed under [References]" } ] }, { "product": "Multiple MFPs (multifunction printers)", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "See the information provided by Toshiba Tec Corporation listed under [References]" } ] } ], "descriptions": [ { "lang": "en", "value": "User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-257", "description": "Storing passwords in a recoverable format", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-26T10:57:58.852Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://global.sharp/products/copier/info/info_security_2024-05.html" }, { "url": "https://jp.sharp/business/print/information/info_security_2024-05.html" }, { "url": "https://www.toshibatec.com/information/20240531_02.html" }, { "url": "https://www.toshibatec.co.jp/information/20240531_02.html" }, { "url": "https://jvn.jp/en/vu/JVNVU93051062/" }, { "url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-32151", "datePublished": "2024-11-26T07:37:32.412Z", "dateReserved": "2024-05-22T09:00:11.984Z", "dateUpdated": "2024-11-26T14:09:24.628Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-32151\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2024-11-26T08:15:05.513\",\"lastModified\":\"2024-11-26T11:21:59.167\",\"vulnStatus\":\"Received\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].\"},{\"lang\":\"es\",\"value\":\"Las contrase\u00f1as de usuario se descifran y se almacenan en la memoria antes de que cualquier usuario inicie sesi\u00f3n. Las contrase\u00f1as descifradas se pueden recuperar del archivo de volcado de memoria. En cuanto a los detalles de los nombres de los productos afectados, los n\u00fameros de modelo y las versiones, consulte la informaci\u00f3n proporcionada por los respectivos proveedores que se enumeran en [Referencias].\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"vultures@jpcert.or.jp\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"vultures@jpcert.or.jp\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-257\"}]}],\"references\":[{\"url\":\"https://global.sharp/products/copier/info/info_security_2024-05.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://jp.sharp/business/print/information/info_security_2024-05.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://jvn.jp/en/vu/JVNVU93051062/\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.toshibatec.co.jp/information/20240531_02.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.toshibatec.com/information/20240531_02.html\",\"source\":\"vultures@jpcert.or.jp\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.