Today > vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-27173

June 14, 2024, 4:15 a.m.

CVSS Score

9.8 / 10

Product(s) Impacted

Toshiba Remote Command program

Description

Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL.

Weaknesses

Date

Published: June 14, 2024, 4:15 a.m.

Last Modified: June 14, 2024, 4:15 a.m.

Status : Received

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

ecc0f906-8666-484c-bcf8-c3b7520a72f0

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

Base Score
9.8
Exploitability Score
Impact Score
Base Severity
CRITICAL
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References

https://jvn.jp/ ecc0f906-8666-484c-bcf8-c3b7520a72f0

https://www.toshibatec.com/ ecc0f906-8666-484c-bcf8-c3b7520a72f0

https://www.toshibatec.com/ ecc0f906-8666-484c-bcf8-c3b7520a72f0