Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33610: Authentication Bypass Using an Alternate Path or Channel in Sharp Corporation Multiple MFPs (multifunction printers)

0
Critical
VulnerabilityCVE-2024-33610cvecve-2024-33610
Published: Tue Nov 26 2024 (11/26/2024, 07:37:44 UTC)
Source: CVE Database V5
Vendor/Project: Sharp Corporation
Product: Multiple MFPs (multifunction printers)

Description

"sessionlist.html" and "sys_trayentryreboot.html" are accessible with no authentication. "sessionlist.html" provides logged-in users' session information including session cookies, and "sys_trayentryreboot.html" allows to reboot the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

AI-Powered Analysis

AILast updated: 11/04/2025, 17:53:25 UTC

Technical Analysis

CVE-2024-33610 is a critical authentication bypass vulnerability discovered in multiple Sharp Corporation multifunction printers (MFPs). The flaw arises because two web interface endpoints, 'sessionlist.html' and 'sys_trayentryreboot.html', are accessible without any authentication. The 'sessionlist.html' page exposes session information of logged-in users, including session cookies, which can be leveraged by attackers to hijack active sessions and gain unauthorized access to the device's management interface. The 'sys_trayentryreboot.html' endpoint allows an attacker to reboot the device remotely without authentication, potentially causing denial of service or disruption of printing services. The vulnerability is exploitable remotely over the network without any user interaction or privileges, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality and integrity is high, as attackers can both access sensitive session data and control device operations. Although no public exploits have been reported yet, the ease of exploitation and critical nature of the flaw necessitate urgent attention. The affected product versions have not been explicitly listed here but are detailed by Sharp Corporation in their advisories. This vulnerability highlights the risks of insufficient access controls on embedded web interfaces in networked devices like MFPs, which are often overlooked in enterprise security.

Potential Impact

For European organizations, this vulnerability presents a significant risk to the confidentiality and integrity of sensitive information processed or stored on Sharp MFP devices. Attackers exploiting this flaw can hijack active sessions to gain unauthorized administrative access, potentially leading to data leakage, manipulation of print jobs, or configuration changes. The ability to reboot devices without authentication can disrupt business operations, causing denial of service and impacting productivity. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely heavily on multifunction printers for document handling are particularly vulnerable. The exposure of session cookies can also facilitate lateral movement within internal networks if attackers gain footholds. Given the network-exploitable nature and lack of required privileges or user interaction, the threat surface is broad, especially in environments where MFPs are accessible from less secure network segments or exposed to the internet. This vulnerability could also undermine compliance with data protection regulations like GDPR if sensitive data is compromised.

Mitigation Recommendations

1. Immediately consult Sharp Corporation’s official security advisories to identify affected models and apply vendor-provided patches or firmware updates as soon as they become available. 2. Until patches are deployed, restrict network access to Sharp MFP web interfaces by implementing network segmentation and firewall rules that limit access to trusted management networks only. 3. Disable or restrict access to the vulnerable web endpoints ('sessionlist.html' and 'sys_trayentryreboot.html') if possible through device configuration or web server controls. 4. Monitor network traffic and device logs for unusual access patterns or repeated requests to these endpoints, which may indicate exploitation attempts. 5. Enforce strong authentication and session management policies on MFPs, including session timeouts and use of secure cookies, to minimize session hijacking risks. 6. Conduct regular security assessments of networked printing devices and include them in vulnerability management programs. 7. Educate IT and security teams about the risks of embedded device web interfaces and the importance of timely patching and access controls. 8. Consider isolating MFPs on dedicated VLANs with strict ingress and egress filtering to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2024-05-22T09:00:05.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b4eff58c9332ff07371

Added to database: 11/4/2025, 5:43:42 PM

Last enriched: 11/4/2025, 5:53:25 PM

Last updated: 11/5/2025, 3:43:58 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats