Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-1239

Опубликовано: 06 апр. 2012
Источник: nvd
CVSS2: 10
EPSS Средний

Описание

The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:toshibatec:e-studio-167_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-181_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-182_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-207_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-232_firmware:t377sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-2330c_firmware:t450sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-2500c_firmware:t380sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-255_firmware:t470sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-255p_firmware:t470sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-281c_firmware:t410sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-282_firmware:t377sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-2830c_firmware:t450sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-3500c_firmware:t380sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-3510c_firmware:t380sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-351c_firmware:t410sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-352_firmware:t364sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-3520c_firmware:t450sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-355_firmware:t470sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-451c_firmware:t410sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-452_firmware:t364sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-4520c_firmware:t450sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-455_firmware:t470sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-5520c_firmware:t430sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-600_firmware:t390sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-6520c_firmware:t430sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-6530c_firmware:t430sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-655_firmware:t100sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-720_firmware:t390sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-755_firmware:t100sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-850_firmware:t390sy0j354:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-855_firmware:t100sy0j302:*:*:*:*:*:*:*
cpe:2.3:a:toshibatec:e-studio-tf-182_with_network_printer_kit_firmware:t282cn0j421:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-167_with_network_printer_kit:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-181_with_network_printer_kit:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-182_with_network_printer_kit:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-207_with_network_printer_kit:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-232:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-2330c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-2500c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-255:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-255p:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-281c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-282:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-2830c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-3500c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-3510c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-351c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-352:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-3520c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-355:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-451c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-452:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-4520c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-455:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-5520c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-600:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-6520c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-6530c:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-655:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-720:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-755:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-850:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-855:-:*:*:*:*:*:*:*
cpe:2.3:h:toshibatec:e-studio-tf-182_with_network_printer_kit:-:*:*:*:*:*:*:*

EPSS

Процентиль: 93%
0.10594
Средний

10 Critical

CVSS2

Дефекты

CWE-264

Связанные уязвимости

github
больше 3 лет назад

The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors.

EPSS

Процентиль: 93%
0.10594
Средний

10 Critical

CVSS2

Дефекты

CWE-264