Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Toshiba
Published: 2024-06-14T04:01:54.119Z
Updated: 2025-02-13T17:46:13.862Z
Reserved: 2024-02-21T02:12:01.820Z
Link: CVE-2024-27173

Updated: 2024-08-02T00:27:59.671Z

Status : Awaiting Analysis
Published: 2024-06-14T04:15:36.540
Modified: 2024-11-21T09:04:01.197
Link: CVE-2024-27173

No data.