[Japanese]

JVNDB-2024-000027

FUJIFILM Business Innovation Corp. printers vulnerable to cross-site request forgery

Overview

Multiple printers provided by FUJIFILM Business Innovation Corp. contain a cross-site request forgery vulnerability (CWE-352).

Junnosuke Kushibiki, Ryu Kuki, Masataka Mizokuchi, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 6.5 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: None
  • Integrity Impact: High
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 2.6 (Low) [IPA Score]
  • Access Vector: Network
  • Access Complexity: High
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products

As for the details of affected product names, model numbers, and versions, refer to the information provided by the vendor listed below.

FUJIFILM Business Innovation Corp. (former Fuji Xerox Co., Ltd.)
  • (multiple product)

Impact

If a user views a malicious page while logging in, the user information may be altered. In the case the user is an administrator, the settings such as the administrator's ID, password, etc. may be altered.
Solution

[Apply workarounds]
The developer states that there are some obsolite models where CSRF prevention function is not implemented.
For those models, applying the following workaround may mitigate the impact of this vulnerability.

* Disable Web UI communication function in the product's settings
Vendor Information

FUJIFILM Business Innovation Corp. (former Fuji Xerox Co., Ltd.)
CWE (What is CWE?)

  1. Cross-Site Request Forgery(CWE-352) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2024-27974
References

  1. JVN : JVN#34328023
Revision History

  • [2024/03/06]
      Web page was published