Ce mail provient de l'extérieur, restons vigilants ===================================================================== CERT-Renater Note d'Information No. 2025/VULN399 _____________________________________________________________________ DATE : 26/06/2025 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Toshiba Tec's digital multi-function peripherals' software. ===================================================================== https://www.toshibatec.com/information/20250625_02.html _____________________________________________________________________ Response to vulnerability in some Toshiba Tec's digital multi-function peripherals June 25, 2025 Toshiba Tec Corporation Thank you for using our products. The following vulnerabilities have been identified in some of our multi-function peripherals. This issue does not result in the leakage of information from the product to outside parties. Vulnerability details Target Products : e-STUDIO 301DN/ 302DNF (These products have been sold only in the Chinese market.) For more information, see the reference sites below (Jump to another website with opening new window.): Reference Reference site CVE-2017-9765 JVNVU#98807587 https://www.cve.org/CVERecord?id=CVE-2017-9765 Stack Buffer Overflow Vulnerability CVE-2024-2169 VNVU#93188600 https://www.cve.org/CVERecord?id=CVE-2024-2169 Infinite loop of messages between servers CVE-2024-51977 JVNVU#90043828 https://www.cve.org/CVERecord?id=CVE-2024-51977 Possibility of information leakage in the printer CVE-2024-51978 JVNVU#90043828 https://www.cve.org/CVERecord?id=CVE-2024-51978 Possibility of authentication bypass CVE-2024-51980 JVNVU#90043828 https://www.cve.org/CVERecord?id=CVE-2024-51980 Possibility of being forced to connect to TCP CVE-2024-51981 JVNVU#90043828 https://www.cve.org/CVERecord?id=CVE-2024-51981 Possibility of arbitrary HTTP request execution CVE-2024-51983 JVNVU#90043828 https://www.cve.org/CVERecord?id=CVE-2024-51983 External attacks can cause your device to crash CVE-2024-51984 JVNVU#90043828 https://www.cve.org/CVERecord?id=CVE-2024-51984 Possibility of information leakage in the printer due to passback attacks Solution Ask your service company to update the main unit software. Workaround If you are using a product for which the firmware is not yet available, please use the workaround methods below. Make sure you use the printer in a firewall-protected network environment in the office or with a router at home. In addition, if necessary, change the following settings individually from "Web browser settings" of the product itself. Reference Workaround CVE-2017-9765 Disable the WSD function. CVE-2024-2169 Disable TFTP. CVE-2024-51977 Disable "Web browser settings" on the product itself. CVE-2024-51978 Change the administrator password from the default value. CVE-2024-51980 Disable the WSD function. CVE-2024-51981 Disable the WSD function. CVE-2024-51983 Disable the WSD function. CVE-2024-51984 Change the administrator password from the default value. Acknowledgements We would like to thank Yepeng Pan of CISPA, Germany, for reporting this vulnerability (CVE-2024-2169). We would like to thank Stephen Fewer, Principal Security Researcher at Rapid7, USA, for reporting these vulnerabilities (CVE-2024-51977 - CVE-2024-51984). ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================