Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32151: Storing passwords in a recoverable format in Sharp Corporation Multiple MFPs (multifunction printers)

0
Medium
VulnerabilityCVE-2024-32151cvecve-2024-32151
Published: Tue Nov 26 2024 (11/26/2024, 07:37:32 UTC)
Source: CVE Database V5
Vendor/Project: Sharp Corporation
Product: Multiple MFPs (multifunction printers)

Description

User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

AI-Powered Analysis

AILast updated: 11/04/2025, 17:52:02 UTC

Technical Analysis

CVE-2024-32151 is a vulnerability identified in multiple Sharp Corporation multifunction printers (MFPs) where user passwords are handled insecurely. Specifically, user passwords are decrypted and stored in device memory before any user logs in. This decrypted password data can be retrieved from coredump files generated by the device, which are typically used for debugging but may be accessible to attackers with sufficient access. The vulnerability does not require any privileges or user interaction to exploit but has a high attack complexity, meaning it is not trivial to leverage without specific conditions or knowledge. The CVSS 3.1 base score is 5.9, reflecting a medium severity level, with a vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). The main risk is confidentiality compromise through exposure of plaintext passwords, which could lead to unauthorized access to the MFP or connected systems if attackers retrieve and use these credentials. The affected product versions are detailed by Sharp Corporation in their advisories. No known exploits are currently reported in the wild. This vulnerability highlights the risk of improper credential handling in embedded systems and the importance of secure memory management and coredump protections.

Potential Impact

For European organizations, the exposure of user passwords stored in recoverable plaintext format on Sharp MFPs poses a significant confidentiality risk. Multifunction printers often handle sensitive documents and are integrated into corporate networks, making them attractive targets for attackers seeking lateral movement or data exfiltration. If attackers gain access to coredump files or device memory, they could extract credentials and potentially access the device management interface or connected network resources. This could lead to unauthorized document access, interception of print jobs, or further compromise of internal systems. The impact is particularly critical in sectors such as government, finance, healthcare, and legal services, where document confidentiality is paramount. Additionally, the vulnerability could undermine trust in device security and compliance with data protection regulations like GDPR if sensitive information is leaked. However, the high attack complexity and lack of known exploits reduce immediate risk, though targeted attacks remain possible.

Mitigation Recommendations

Organizations should monitor Sharp Corporation advisories closely and apply firmware updates or patches as soon as they become available to address this vulnerability. Until patches are deployed, restrict physical and network access to MFP devices to trusted personnel only. Disable or tightly control coredump generation and storage on affected devices, ensuring that coredump files are encrypted or inaccessible to unauthorized users. Implement network segmentation to isolate MFPs from critical systems and sensitive data repositories. Regularly audit device logs and access records for signs of suspicious activity. Employ strong authentication mechanisms for device management interfaces and consider using network access control (NAC) to limit device connectivity. Educate IT staff about the risks of credential exposure in embedded devices and incorporate MFP security into broader endpoint protection strategies. Finally, consider replacing legacy or unsupported devices with models that follow modern security best practices for credential handling.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2024-05-22T09:00:11.984Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b4dff58c9332ff06eb0

Added to database: 11/4/2025, 5:43:41 PM

Last enriched: 11/4/2025, 5:52:02 PM

Last updated: 12/19/2025, 11:36:42 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats