All the vulnerabilites related to KYOCERA Document Solutions Inc. - Kyocera Document Solutions MFPs and printers
cve-2022-41807
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
Missing authorization vulnerability exists in Kyocera Document Solutions MFPs and printers, which may allow a network-adjacent attacker to alter the product settings without authentication by sending a specially crafted request. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:38.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2022-11-01.html" }, { "tags": [ "x_transferred" ], "url": "https://www.kyoceradocumentsolutions.co.jp/support/information/info_20221101.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN46345126/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Kyocera Document Solutions MFPs and printers", "vendor": "KYOCERA Document Solutions Inc.", "versions": [ { "status": "affected", "version": "A wide range of products is affected. For the specific products/versions information, see the URL provided by the vendor which is listed in [Reference] section." } ] } ], "descriptions": [ { "lang": "en", "value": "Missing authorization vulnerability exists in Kyocera Document Solutions MFPs and printers, which may allow a network-adjacent attacker to alter the product settings without authentication by sending a specially crafted request. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing authorization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-05T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2022-11-01.html" }, { "url": "https://www.kyoceradocumentsolutions.co.jp/support/information/info_20221101.html" }, { "url": "https://jvn.jp/en/jp/JVN46345126/index.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-41807", "datePublished": "2022-12-05T00:00:00", "dateReserved": "2022-10-22T00:00:00", "dateUpdated": "2024-08-03T12:56:38.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41830
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
Stored cross-site scripting vulnerability in Kyocera Document Solutions MFPs and printers allows a remote authenticated attacker with an administrative privilege to inject arbitrary script. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:37.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2022-11-01.html" }, { "tags": [ "x_transferred" ], "url": "https://www.kyoceradocumentsolutions.co.jp/support/information/info_20221101.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN46345126/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Kyocera Document Solutions MFPs and printers", "vendor": "KYOCERA Document Solutions Inc.", "versions": [ { "status": "affected", "version": "A wide range of products is affected. For the specific products/versions information, see the URL provided by the vendor which is listed in [Reference] section." } ] } ], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting vulnerability in Kyocera Document Solutions MFPs and printers allows a remote authenticated attacker with an administrative privilege to inject arbitrary script. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-05T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2022-11-01.html" }, { "url": "https://www.kyoceradocumentsolutions.co.jp/support/information/info_20221101.html" }, { "url": "https://jvn.jp/en/jp/JVN46345126/index.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-41830", "datePublished": "2022-12-05T00:00:00", "dateReserved": "2022-10-22T00:00:00", "dateUpdated": "2024-08-03T12:56:37.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41798
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
Session information easily guessable vulnerability exists in Kyocera Document Solutions MFPs and printers, which may allow a network-adjacent attacker to log in to the product by spoofing a user with guessed session information. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:37.889Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2022-11-01.html" }, { "tags": [ "x_transferred" ], "url": "https://www.kyoceradocumentsolutions.co.jp/support/information/info_20221101.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN46345126/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Kyocera Document Solutions MFPs and printers", "vendor": "KYOCERA Document Solutions Inc.", "versions": [ { "status": "affected", "version": "A wide range of products is affected. For the specific products/versions information, see the URL provided by the vendor which is listed in [Reference] section." } ] } ], "descriptions": [ { "lang": "en", "value": "Session information easily guessable vulnerability exists in Kyocera Document Solutions MFPs and printers, which may allow a network-adjacent attacker to log in to the product by spoofing a user with guessed session information. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN." } ], "problemTypes": [ { "descriptions": [ { "description": "Session Information Easily Guessable", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-05T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2022-11-01.html" }, { "url": "https://www.kyoceradocumentsolutions.co.jp/support/information/info_20221101.html" }, { "url": "https://jvn.jp/en/jp/JVN46345126/index.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-41798", "datePublished": "2022-12-05T00:00:00", "dateReserved": "2022-10-22T00:00:00", "dateUpdated": "2024-08-03T12:56:37.889Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }