Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33605: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Sharp Corporation Multiple MFPs (multifunction printers)

0
High
VulnerabilityCVE-2024-33605cvecve-2024-33605
Published: Tue Nov 26 2024 (11/26/2024, 07:37:38 UTC)
Source: CVE Database V5
Vendor/Project: Sharp Corporation
Product: Multiple MFPs (multifunction printers)

Description

Improper processing of some parameters of installed_emanual_list.html leads to a path traversal vulnerability. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

AI-Powered Analysis

AILast updated: 11/04/2025, 17:53:12 UTC

Technical Analysis

CVE-2024-33605 is a path traversal vulnerability identified in multiple Sharp Corporation multifunction printers (MFPs). The flaw stems from improper limitation of pathname parameters in the installed_emanual_list.html component, which is part of the device's web interface. This improper validation allows an unauthenticated remote attacker to craft specially crafted requests that traverse directories and access files outside the intended restricted directory. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The impact primarily concerns confidentiality, as attackers can read sensitive files stored on the device or accessible via the device's filesystem, potentially exposing configuration files, credentials, or other sensitive data. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its high severity due to network attack vector, low complexity, no privileges required, and no user interaction needed. Although no public exploits have been observed in the wild to date, the vulnerability poses a significant risk to organizations relying on Sharp MFPs, especially where these devices are connected to internal networks. The affected product versions and models are detailed by Sharp Corporation in their advisories, and organizations should consult those references for precise identification. This vulnerability highlights the risks associated with embedded device web interfaces and the importance of strict input validation to prevent directory traversal attacks.

Potential Impact

For European organizations, the exploitation of CVE-2024-33605 could lead to unauthorized disclosure of sensitive information stored on or accessible through Sharp MFPs. This could include internal documents, configuration files, or credentials that may facilitate further network compromise. Confidentiality breaches could impact compliance with GDPR and other data protection regulations, leading to legal and financial repercussions. The vulnerability does not directly affect device availability or integrity but could serve as a foothold for lateral movement or espionage within corporate networks. Organizations with extensive deployment of Sharp MFPs, especially in sectors like government, finance, healthcare, and critical infrastructure, face elevated risks. The ease of remote exploitation without authentication increases the threat level, particularly if devices are exposed to less secure network segments or the internet. The potential impact is amplified in environments where MFPs are integrated with document management systems or store sensitive scanned data locally.

Mitigation Recommendations

1. Immediately review Sharp Corporation's official advisories and apply any available patches or firmware updates addressing CVE-2024-33605. 2. Restrict network access to MFP web interfaces by implementing network segmentation and firewall rules limiting access to trusted administrative networks only. 3. Disable or restrict access to the installed_emanual_list.html component or related web services if not required for business operations. 4. Monitor network traffic and device logs for unusual access patterns or attempts to exploit path traversal, such as requests containing directory traversal sequences (e.g., ../). 5. Conduct regular security assessments of MFP devices, including vulnerability scanning and penetration testing focused on embedded web interfaces. 6. Educate IT and security teams about the risks associated with embedded device vulnerabilities and enforce strict access controls. 7. Consider deploying network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect path traversal attempts targeting Sharp MFPs. 8. Maintain an inventory of all Sharp MFP models and firmware versions in use to prioritize remediation efforts effectively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2024-05-22T09:00:15.651Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b4eff58c9332ff07368

Added to database: 11/4/2025, 5:43:42 PM

Last enriched: 11/4/2025, 5:53:12 PM

Last updated: 11/5/2025, 2:08:20 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats