cve-2024-28955
Vulnerability from cvelistv5
Published
2024-11-26 07:37
Modified
2024-11-26 14:09
Severity ?
EPSS score ?
Summary
Affected devices create coredump files when crashed, storing them with world-readable permission. Any local user of the device can examine the coredump files, and research the memory contents. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Sharp Corporation | Multiple MFPs (multifunction printers) |
Version: See the information provided by Sharp Corporation listed under [References] |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-28955", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T14:03:35.804923Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T14:09:24.903Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Multiple MFPs (multifunction printers)", "vendor": "Sharp Corporation", "versions": [ { "status": "affected", "version": "See the information provided by Sharp Corporation listed under [References]" } ] }, { "product": "Multiple MFPs (multifunction printers)", "vendor": "Toshiba Tec Corporation", "versions": [ { "status": "affected", "version": "See the information provided by Toshiba Tec Corporation listed under [References]" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected devices create coredump files when crashed, storing them with world-readable permission. Any local user of the device can examine the coredump files, and research the memory contents. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "Incorrect permission assignment for critical resource", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-26T07:37:14.737Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://global.sharp/products/copier/info/info_security_2024-05.html" }, { "url": "https://jp.sharp/business/print/information/info_security_2024-05.html" }, { "url": "https://www.toshibatec.com/information/20240531_02.html" }, { "url": "https://www.toshibatec.co.jp/information/20240531_02.html" }, { "url": "https://jvn.jp/en/vu/JVNVU93051062/" }, { "url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-28955", "datePublished": "2024-11-26T07:37:14.737Z", "dateReserved": "2024-05-22T09:00:18.956Z", "dateUpdated": "2024-11-26T14:09:24.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-28955\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2024-11-26T08:15:05.043\",\"lastModified\":\"2024-11-26T08:15:05.043\",\"vulnStatus\":\"Received\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Affected devices create coredump files when crashed, storing them with world-readable permission. Any local user of the device can examine the coredump files, and research the memory contents. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].\"},{\"lang\":\"es\",\"value\":\"Los dispositivos afectados crean archivos de volcado de memoria cuando fallan y los almacenan con permiso de lectura universal. Cualquier usuario local del dispositivo puede examinar los archivos de volcado de memoria e investigar el contenido de la memoria. En cuanto a los detalles de los nombres de los productos afectados, los n\u00fameros de modelo y las versiones, consulte la informaci\u00f3n proporcionada por los respectivos proveedores que se enumeran en [Referencias].\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"vultures@jpcert.or.jp\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"vultures@jpcert.or.jp\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-732\"}]}],\"references\":[{\"url\":\"https://global.sharp/products/copier/info/info_security_2024-05.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://jp.sharp/business/print/information/info_security_2024-05.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://jvn.jp/en/vu/JVNVU93051062/\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.toshibatec.co.jp/information/20240531_02.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.toshibatec.com/information/20240531_02.html\",\"source\":\"vultures@jpcert.or.jp\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.