Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-24397 | The session cookies, used for authentication, are stored in clear-text logs. An attacker can retrieve authentication sessions. A remote attacker can retrieve the credentials and bypass the authentication mechanism. As for the affected products/models/versions, see the reference URL. |
Solution
This issue is fixed in the version released on June 14, 2024 and all later versions.
Workaround
When connecting the MFPs and printers with an outer network such as the Internet, only operate it in a network environment protected by a firewall, etc. to prevent information from being leaked due to incorrect settings or avoid illegal access by unauthorized users.
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Toshiba
Published:
Updated: 2025-02-13T17:46:03.200Z
Reserved: 2024-02-21T02:11:56.735Z
Link: CVE-2024-27156
Updated: 2024-08-02T00:27:59.190Z
Status : Awaiting Analysis
Published: 2024-06-14T04:15:18.743
Modified: 2024-11-21T09:03:58.593
Link: CVE-2024-27156
No data.
OpenCVE Enrichment
No data.
EUVD