CVE-2024-33605: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Sharp Corporation Multiple MFPs (multifunction printers)
Improper processing of some parameters of installed_emanual_list.html leads to a path traversal vulnerability. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
AI Analysis
Technical Summary
CVE-2024-33605 is a path traversal vulnerability identified in multiple Sharp Corporation multifunction printers (MFPs). The flaw stems from improper limitation of pathname parameters in the installed_emanual_list.html component, which is part of the device's web interface. This improper validation allows an unauthenticated remote attacker to craft specially crafted requests that traverse directories and access files outside the intended restricted directory. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The impact primarily concerns confidentiality, as attackers can read sensitive files stored on the device or accessible via the device's filesystem, potentially exposing configuration files, credentials, or other sensitive data. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its high severity due to network attack vector, low complexity, no privileges required, and no user interaction needed. Although no public exploits have been observed in the wild to date, the vulnerability poses a significant risk to organizations relying on Sharp MFPs, especially where these devices are connected to internal networks. The affected product versions and models are detailed by Sharp Corporation in their advisories, and organizations should consult those references for precise identification. This vulnerability highlights the risks associated with embedded device web interfaces and the importance of strict input validation to prevent directory traversal attacks.
Potential Impact
For European organizations, the exploitation of CVE-2024-33605 could lead to unauthorized disclosure of sensitive information stored on or accessible through Sharp MFPs. This could include internal documents, configuration files, or credentials that may facilitate further network compromise. Confidentiality breaches could impact compliance with GDPR and other data protection regulations, leading to legal and financial repercussions. The vulnerability does not directly affect device availability or integrity but could serve as a foothold for lateral movement or espionage within corporate networks. Organizations with extensive deployment of Sharp MFPs, especially in sectors like government, finance, healthcare, and critical infrastructure, face elevated risks. The ease of remote exploitation without authentication increases the threat level, particularly if devices are exposed to less secure network segments or the internet. The potential impact is amplified in environments where MFPs are integrated with document management systems or store sensitive scanned data locally.
Mitigation Recommendations
1. Immediately review Sharp Corporation's official advisories and apply any available patches or firmware updates addressing CVE-2024-33605. 2. Restrict network access to MFP web interfaces by implementing network segmentation and firewall rules limiting access to trusted administrative networks only. 3. Disable or restrict access to the installed_emanual_list.html component or related web services if not required for business operations. 4. Monitor network traffic and device logs for unusual access patterns or attempts to exploit path traversal, such as requests containing directory traversal sequences (e.g., ../). 5. Conduct regular security assessments of MFP devices, including vulnerability scanning and penetration testing focused on embedded web interfaces. 6. Educate IT and security teams about the risks associated with embedded device vulnerabilities and enforce strict access controls. 7. Consider deploying network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect path traversal attempts targeting Sharp MFPs. 8. Maintain an inventory of all Sharp MFP models and firmware versions in use to prioritize remediation efforts effectively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2024-33605: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Sharp Corporation Multiple MFPs (multifunction printers)
Description
Improper processing of some parameters of installed_emanual_list.html leads to a path traversal vulnerability. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
AI-Powered Analysis
Technical Analysis
CVE-2024-33605 is a path traversal vulnerability identified in multiple Sharp Corporation multifunction printers (MFPs). The flaw stems from improper limitation of pathname parameters in the installed_emanual_list.html component, which is part of the device's web interface. This improper validation allows an unauthenticated remote attacker to craft specially crafted requests that traverse directories and access files outside the intended restricted directory. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The impact primarily concerns confidentiality, as attackers can read sensitive files stored on the device or accessible via the device's filesystem, potentially exposing configuration files, credentials, or other sensitive data. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its high severity due to network attack vector, low complexity, no privileges required, and no user interaction needed. Although no public exploits have been observed in the wild to date, the vulnerability poses a significant risk to organizations relying on Sharp MFPs, especially where these devices are connected to internal networks. The affected product versions and models are detailed by Sharp Corporation in their advisories, and organizations should consult those references for precise identification. This vulnerability highlights the risks associated with embedded device web interfaces and the importance of strict input validation to prevent directory traversal attacks.
Potential Impact
For European organizations, the exploitation of CVE-2024-33605 could lead to unauthorized disclosure of sensitive information stored on or accessible through Sharp MFPs. This could include internal documents, configuration files, or credentials that may facilitate further network compromise. Confidentiality breaches could impact compliance with GDPR and other data protection regulations, leading to legal and financial repercussions. The vulnerability does not directly affect device availability or integrity but could serve as a foothold for lateral movement or espionage within corporate networks. Organizations with extensive deployment of Sharp MFPs, especially in sectors like government, finance, healthcare, and critical infrastructure, face elevated risks. The ease of remote exploitation without authentication increases the threat level, particularly if devices are exposed to less secure network segments or the internet. The potential impact is amplified in environments where MFPs are integrated with document management systems or store sensitive scanned data locally.
Mitigation Recommendations
1. Immediately review Sharp Corporation's official advisories and apply any available patches or firmware updates addressing CVE-2024-33605. 2. Restrict network access to MFP web interfaces by implementing network segmentation and firewall rules limiting access to trusted administrative networks only. 3. Disable or restrict access to the installed_emanual_list.html component or related web services if not required for business operations. 4. Monitor network traffic and device logs for unusual access patterns or attempts to exploit path traversal, such as requests containing directory traversal sequences (e.g., ../). 5. Conduct regular security assessments of MFP devices, including vulnerability scanning and penetration testing focused on embedded web interfaces. 6. Educate IT and security teams about the risks associated with embedded device vulnerabilities and enforce strict access controls. 7. Consider deploying network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect path traversal attempts targeting Sharp MFPs. 8. Maintain an inventory of all Sharp MFP models and firmware versions in use to prioritize remediation efforts effectively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jpcert
- Date Reserved
- 2024-05-22T09:00:15.651Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a3b4eff58c9332ff07368
Added to database: 11/4/2025, 5:43:42 PM
Last enriched: 11/4/2025, 5:53:12 PM
Last updated: 11/5/2025, 2:08:20 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumCVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
UnknownCVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumCVE-2025-12468: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.