The session cookies, used for authentication, are stored in clear-text logs. An attacker can retrieve authentication sessions. A remote attacker can retrieve the credentials and bypass the authentication mechanism. As for the affected products/models/versions, see the reference URL.
Fixes

Solution

This issue is fixed in the version released on June 14, 2024 and all later versions.


Workaround

When connecting the MFPs and printers with an outer network such as the Internet, only operate it in a network environment protected by a firewall, etc. to prevent information from being leaked due to incorrect settings or avoid illegal access by unauthorized users.

History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Toshiba

Published:

Updated: 2025-02-13T17:46:03.200Z

Reserved: 2024-02-21T02:11:56.735Z

Link: CVE-2024-27156

cve-icon Vulnrichment

Updated: 2024-08-02T00:27:59.190Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-14T04:15:18.743

Modified: 2024-11-21T09:03:58.593

Link: CVE-2024-27156

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.