Toshiba printers use SNMP for configuration. Using the...
Critical severity
Unreviewed
Published
Jun 14, 2024
to the GitHub Advisory Database
•
Updated Jul 4, 2024
Description
Published by the National Vulnerability Database
Jun 14, 2024
Published to the GitHub Advisory Database
Jun 14, 2024
Last updated
Jul 4, 2024
Toshiba printers use SNMP for configuration. Using the private community, it is possible to remotely execute commands as root on the remote printer. Using this vulnerability will allow any attacker to get a root access on a remote Toshiba printer. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.
References