CVE-2024-3498

EUVD-2024-32084
Attackers can then execute malicious files by enabling certain services of the printer via the web configuration page and elevate its privileges to root. As for the affected products/models/versions, see the reference URL.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
toshibatece-studio-2521_ac
𝑥
≤ *
ADP
toshibatece-studio-2020_ac
𝑥
≤ *
ADP
toshibatece-studio-2520_nc
𝑥
≤ *
ADP
toshibatece-studio-2021_ac
𝑥
≤ *
ADP
toshibatece-studio-2525_ac
𝑥
≤ *
ADP
toshibatece-studio-3025_ac
𝑥
≤ *
ADP
toshibatece-studio-3525_ac
𝑥
≤ *
ADP
toshibatece-studio-3525_acg
𝑥
≤ *
ADP
toshibatece-studio-4525_ac
𝑥
≤ *
ADP
toshibatece-studio-5525_ac
𝑥
≤ *
ADP
toshibatece-studio-5525_acg
𝑥
≤ *
ADP
toshibatece-studio-6525_ac
𝑥
≤ *
ADP
toshibatece-studio-6525_acg
𝑥
≤ *
ADP
toshibatece-studio-2528-a
𝑥
≤ *
ADP
toshibatece-studio-3028-a
𝑥
≤ *
ADP
toshibatece-studio-3528-a
𝑥
≤ *
ADP
toshibatece-studio-3528-ag
𝑥
≤ *
ADP
toshibatece-studio-4528-a
𝑥
≤ *
ADP
toshibatece-studio-4528-ag
𝑥
≤ *
ADP
toshibatece-studio-5528-a
𝑥
≤ *
ADP
toshibatece-studio-6528-a
𝑥
≤ *
ADP
toshibatece-studio-6526-ac
𝑥
≤ *
ADP
toshibatece-studio-6527-ac
𝑥
≤ *
ADP
toshibatece-studio-7527-ac
𝑥
≤ *
ADP
toshibatece-studio-6529-a
𝑥
≤ *
ADP
toshibatece-studio-7529-a
𝑥
≤ *
ADP
toshibatece-studio-9029-a
𝑥
≤ *
ADP
toshibatece-studio-330-ac
𝑥
≤ *
ADP
toshibatece-studio-400-ac
𝑥
≤ *
ADP
toshibatece-studio-2010-ac
𝑥
≤ *
ADP
toshibatece-studio-2110-ac
𝑥
≤ *
ADP
toshibatece-studio-2510-ac
𝑥
≤ *
ADP
toshibatece-studio-2610-ac
𝑥
≤ *
ADP
toshibatece-studio-2015-nc
𝑥
≤ *
ADP
toshibatece-studio-2515-nc
𝑥
≤ *
ADP
toshibatece-studio-2615-nc
𝑥
≤ *
ADP
toshibatece-studio-3015-nc
𝑥
≤ *
ADP
toshibatece-studio-3115-nc
𝑥
≤ *
ADP
toshibatece-studio-3515-nc
𝑥
≤ *
ADP
toshibatece-studio-3615-nc
𝑥
≤ *
ADP