Multiple vulnerabilities in Oki Electric Industry MFPs



Published: 2024-06-21
Risk High
Patch available YES
Number of vulnerabilities 43
CVE-ID CVE-2024-27170
CVE-2024-27156
CVE-2024-27157
CVE-2024-27166
CVE-2024-27179
CVE-2024-27158
CVE-2024-27159
CVE-2024-27160
CVE-2024-27161
CVE-2024-27168
CVE-2024-27164
CVE-2024-27178
CVE-2024-27162
CVE-2024-27163
CVE-2024-27165
CVE-2024-27169
CVE-2024-27172
CVE-2024-27175
CVE-2024-27180
CVE-2024-3496
CVE-2024-3497
CVE-2024-27154
CVE-2024-27177
CVE-2024-27150
CVE-2024-27141
CVE-2024-27142
CVE-2024-27143
CVE-2024-27146
CVE-2024-27147
CVE-2024-3498
CVE-2024-27148
CVE-2024-27149
CVE-2024-27151
CVE-2024-27176
CVE-2024-27152
CVE-2024-27153
CVE-2024-27155
CVE-2024-27167
CVE-2024-27171
CVE-2024-27144
CVE-2024-27145
CVE-2024-27173
CVE-2024-27174
CWE-ID CWE-798
CWE-532
CWE-256
CWE-1295
CWE-1392
CWE-259
CWE-22
CWE-79
CWE-319
CWE-272
CWE-306
CWE-78
CWE-73
CWE-367
CWE-288
CWE-276
CWE-776
CWE-250
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
ES9476MFP
Hardware solutions / Office equipment, IP-phones, print servers

ES9466MFP
Hardware solutions / Office equipment, IP-phones, print servers

Vendor Oki Electric Industry

Security Bulletin

This security bulletin contains information about 43 vulnerabilities.

1) Use of hard-coded credentials

EUVDB-ID: #VU92407

Risk: Low

CVSSv3.1: 5.4 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27170

CWE-ID: CWE-798 - Use of Hard-coded Credentials

Exploit availability: No

Description

The vulnerability allows a local attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code. A local attacker can decrypt the encrypted files using the hardcoded key.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Inclusion of Sensitive Information in Log Files

EUVDB-ID: #VU92286

Risk: Low

CVSSv3.1: 5.4 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27156

CWE-ID: CWE-532 - Information Exposure Through Log Files

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files. A local attacker can read the log files and gain access to sensitive data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Inclusion of Sensitive Information in Log Files

EUVDB-ID: #VU92287

Risk: Low

CVSSv3.1: 5.4 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27157

CWE-ID: CWE-532 - Information Exposure Through Log Files

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files. A local attacker can read the log files and gain access to sensitive data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Unprotected storage of credentials

EUVDB-ID: #VU92288

Risk: Low

CVSSv3.1: 4.5 [CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27166

CWE-ID: CWE-256 - Unprotected Storage of Credentials

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to other users' credentials.

The vulnerability exists due to application stored credentials in plain text in a configuration file on the system. A local attacker can view contents of the configuration file and gain access to passwords for 3rd party integration.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Debug Messages Revealing Unnecessary Information

EUVDB-ID: #VU92289

Risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27179

CWE-ID: CWE-1295 - Debug Messages Revealing Unnecessary Information

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to admin cookies are written in clear-text in logs. A local user can retrieve them and bypass the authentication mechanism.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use of default credentials

EUVDB-ID: #VU92384

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27158

CWE-ID: CWE-1392 - Use of Default Credentials

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to usage of default administrative credentials. A remote attacker can use default credentials to compromise the affected device.


Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use of hard-coded credentials

EUVDB-ID: #VU92386

Risk: Low

CVSSv3.1: 5.4 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27159

CWE-ID: CWE-798 - Use of Hard-coded Credentials

Exploit availability: No

Description

The vulnerability allows a local attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code. A local attacker can decrypt the encrypted files using the hardcoded key.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use of hard-coded credentials

EUVDB-ID: #VU92388

Risk: Low

CVSSv3.1: 5.4 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27160

CWE-ID: CWE-798 - Use of Hard-coded Credentials

Exploit availability: No

Description

The vulnerability allows a local attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code. A local attacker can decrypt the encrypted files using the hardcoded key.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use of hard-coded credentials

EUVDB-ID: #VU92391

Risk: Low

CVSSv3.1: 5.4 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27161

CWE-ID: CWE-798 - Use of Hard-coded Credentials

Exploit availability: No

Description

The vulnerability allows a local attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code. A local attacker can decrypt the encrypted files using the hardcoded key.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use of hard-coded credentials

EUVDB-ID: #VU92403

Risk: Low

CVSSv3.1: 5.4 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27168

CWE-ID: CWE-798 - Use of Hard-coded Credentials

Exploit availability: No

Description

The vulnerability allows a local attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code. A local attacker can decrypt the encrypted files using the hardcoded key.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use of Hard-coded Password

EUVDB-ID: #VU92474

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27164

CWE-ID: CWE-259 - Use of Hard-coded Password

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to use a hard-coded password. A local attacker can gain access to sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Path traversal

EUVDB-ID: #VU92279

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27178

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Cross-site scripting

EUVDB-ID: #VU92479

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27162

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Cleartext transmission of sensitive information

EUVDB-ID: #VU92483

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27163

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker can gain access to sensitive data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Least Privilege Violation

EUVDB-ID: #VU92485

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27165

CWE-ID: CWE-272 - Least Privilege Violation

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the system.

The vulnerability exists due to least privilege violation. A local user can execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Missing Authentication for Critical Function

EUVDB-ID: #VU92488

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27169

CWE-ID: CWE-306 - Missing Authentication for Critical Function

Exploit availability: No

Description

The vulnerability allows a local attacker to bypass authentication process.

The vulnerability exists due to missing authentication for critical function. A local attacker can bypass authentication process and access the administrative interface.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) OS Command Injection

EUVDB-ID: #VU92495

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27172

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) External Control of File Name or Path

EUVDB-ID: #VU92498

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27175

CWE-ID: CWE-73 - External Control of File Name or Path

Exploit availability: No

Description

The vulnerability allows a remote attacker to read arbitrary files.

The vulnerability exists due to application allows an attacker to control path of the files to read. A remote attacker can send a specially crafted HTTP request and read any file on the printer.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Time-of-check Time-of-use (TOCTOU) Race Condition

EUVDB-ID: #VU92499

Risk: Medium

CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27180

CWE-ID: CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to a time-of-check, time-of-use (TOCTOU) race condition. A local attacker can cause a race condition and alter the information

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Authentication bypass using an alternate path or channel

EUVDB-ID: #VU92534

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-3496

CWE-ID: CWE-288 - Authentication Bypass Using an Alternate Path or Channel

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to authentication bypass using an alternate path or channel. A remote attacker on the local network can gain unauthorized access to sensitive information on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Path traversal

EUVDB-ID: #VU92549

Risk: Medium

CVSSv3.1: 7.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-3497

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker on the local network can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Inclusion of Sensitive Information in Log Files

EUVDB-ID: #VU92285

Risk: Low

CVSSv3.1: 5.4 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27154

CWE-ID: CWE-532 - Information Exposure Through Log Files

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files. A local attacker can read the log files and gain access to sensitive data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Path traversal

EUVDB-ID: #VU92278

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27177

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Incorrect default permissions

EUVDB-ID: #VU92266

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27150

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local attacker can execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) XML Entity Expansion

EUVDB-ID: #VU92254

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27141

CWE-ID: CWE-776 - Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial o service (DoS) attack.

The vulnerability exists due to improper restrictions on XML entities. A remote attacker can send a specially crafted HTTP request and cause a denial of service condition on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) XML Entity Expansion

EUVDB-ID: #VU92255

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27142

CWE-ID: CWE-776 - Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial o service (DoS) attack.

The vulnerability exists due to improper restrictions on XML entities. A remote attacker can send a specially crafted HTTP request and cause a denial of service condition on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Execution with unnecessary privileges

EUVDB-ID: #VU92257

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27143

CWE-ID: CWE-250 - Execution with Unnecessary Privileges

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to application does not properly impose security restrictions. A remote attacker can execute arbitrary code on the system with root privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Execution with unnecessary privileges

EUVDB-ID: #VU92258

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27146

CWE-ID: CWE-250 - Execution with Unnecessary Privileges

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to application does not properly impose security restrictions. A remote attacker can execute arbitrary code on the system with root privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Execution with unnecessary privileges

EUVDB-ID: #VU92259

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27147

CWE-ID: CWE-250 - Execution with Unnecessary Privileges

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to application does not properly impose security restrictions. A remote attacker can execute arbitrary code on the system with root privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Execution with unnecessary privileges

EUVDB-ID: #VU92261

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-3498

CWE-ID: CWE-250 - Execution with Unnecessary Privileges

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to application does not properly impose security restrictions. A remote attacker can execute arbitrary code on the system with root privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Incorrect default permissions

EUVDB-ID: #VU92264

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27148

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local attacker can execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Incorrect default permissions

EUVDB-ID: #VU92265

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27149

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local attacker can execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Incorrect default permissions

EUVDB-ID: #VU92267

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27151

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local attacker can execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Path traversal

EUVDB-ID: #VU92277

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27176

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Incorrect default permissions

EUVDB-ID: #VU92268

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27152

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local attacker can execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Incorrect default permissions

EUVDB-ID: #VU92269

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27153

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local attacker can execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Incorrect default permissions

EUVDB-ID: #VU92270

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27155

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local attacker can execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Incorrect default permissions

EUVDB-ID: #VU92271

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27167

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local attacker can execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Incorrect default permissions

EUVDB-ID: #VU92272

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27171

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local attacker can execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Path traversal

EUVDB-ID: #VU92273

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27144

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Path traversal

EUVDB-ID: #VU92274

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27145

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Path traversal

EUVDB-ID: #VU92275

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27173

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Path traversal

EUVDB-ID: #VU92276

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27174

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ES9476MFP: All versions

ES9466MFP: All versions

External links

http://jvn.jp/en/vu/JVNVU97136265/index.html
http://www.oki.com/eu/printing/about-us/news-room/security-bulletins/2024/response-to-vulnerabilities-in-digital-multi-function-peripherals/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###