cve-2022-41830
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
Stored cross-site scripting vulnerability in Kyocera Document Solutions MFPs and printers allows a remote authenticated attacker with an administrative privilege to inject arbitrary script. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN46345126/index.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://www.kyoceradocumentsolutions.co.jp/support/information/info_20221101.html | Mitigation, Vendor Advisory | |
vultures@jpcert.or.jp | https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2022-11-01.html | Third Party Advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:37.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2022-11-01.html" }, { "tags": [ "x_transferred" ], "url": "https://www.kyoceradocumentsolutions.co.jp/support/information/info_20221101.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN46345126/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Kyocera Document Solutions MFPs and printers", "vendor": "KYOCERA Document Solutions Inc.", "versions": [ { "status": "affected", "version": "A wide range of products is affected. For the specific products/versions information, see the URL provided by the vendor which is listed in [Reference] section." } ] } ], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting vulnerability in Kyocera Document Solutions MFPs and printers allows a remote authenticated attacker with an administrative privilege to inject arbitrary script. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-05T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2022-11-01.html" }, { "url": "https://www.kyoceradocumentsolutions.co.jp/support/information/info_20221101.html" }, { "url": "https://jvn.jp/en/jp/JVN46345126/index.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-41830", "datePublished": "2022-12-05T00:00:00", "dateReserved": "2022-10-22T00:00:00", "dateUpdated": "2024-08-03T12:56:37.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-41830\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2022-12-05T04:15:10.077\",\"lastModified\":\"2022-12-06T15:59:28.237\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stored cross-site scripting vulnerability in Kyocera Document Solutions MFPs and printers allows a remote authenticated attacker with an administrative privilege to inject arbitrary script. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en Kyocera Document Solutions MFPs e impresoras permite que un atacante remoto autenticado con privilegios administrativos inyecte scripts arbitrarios. Los productos/versiones afectados son los siguientes: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C212 6MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/ 6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C 8600DN, ECOSYS P6026cdn, FS-C5250DN, LS -4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn y FS-1370DN.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.7,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_7550ci_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8DD09F7-D74C-4E77-9E4E-52E62328CE9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_7550ci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3904A94D-875D-48CA-ACC6-72286EAE6B0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_6550ci_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FEB3C00-212D-4961-A339-999318FBE616\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_6550ci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F32F0619-6DF1-4533-A76E-889C7CB9E54B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_5550ci_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC84D422-16FF-4153-AD03-7EF0E8B3CD22\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_5550ci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70C89AB2-D3AB-4F12-A417-09C4BACFE399\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_4550ci_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F6F703E-D026-443D-AB3A-4DF739239BF5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_4550ci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30A3280D-074C-40A4-8486-7D687C03B3AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_3550ci_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C72FE12-6BA0-4F85-B75B-9EEFBC993B72\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_3550ci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FB9E15E-FEE4-42CC-856B-A6F54347953B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_3050ci_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E07D4900-C517-43E9-AD4F-45FC6F2D90E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_3050ci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED75F0CE-2BBA-42E0-97B6-4EDCA7BF25FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_255c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE286E6-8B19-4A51-B076-9512295F9C69\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_255c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E08120C8-C32E-4E90-B5D7-4D8B49BA8BC2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_205c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F8DD100-1F24-436E-B8AF-E8B004228116\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_205c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77C89175-0F5B-493F-BB09-E5B50869DFF7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_256ci_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD4577A-0D9E-42E7-999C-FCA7904597C2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_256ci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E76EC529-1A7D-4972-95ED-108906954F59\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_206ci_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8932D69E-070C-46DD-88B8-10A60F638335\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_206ci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA1507F-5DA9-4135-9C2F-9EE016E301F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ecosys_m6526cdn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6F65444-6303-466F-8FEE-E94B6476497E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ecosys_m6526cdn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65A9F645-3311-4CD4-B971-3384AF25874B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ecosys_m6526cidn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFDFADE-C1A8-48D2-B221-071C84E41AA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ecosys_m6526cidn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B0F0526-3CE0-4B58-9141-9CA5D67E4C8A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:fs-c2126mfp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66B80776-FBF6-4E2E-86B4-51A42E793A43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:fs-c2126mfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA27241A-8A7F-4D9F-BFDD-246383D07DE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:fs-c2126mfp\\\\+_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A843A961-5C3A-4B36-B939-194AF8CF9B1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:fs-c2126mfp\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6B2FF1C-70DA-4F43-AC3D-7A20E90B92DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:fs-c2026mfp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD26704-885E-4C5E-8168-1F06B97987F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:fs-c2026mfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2B8DC97-E1A5-46BC-9DB7-3838B1C70093\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_8000i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06383E9D-3387-4369-82E6-B85E2CC2F100\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_8000i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1957F3F7-C615-459F-AB39-5649D96E58EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_6500i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"358C4FE9-CA3E-4BB9-ACC0-2EC6E9FD2650\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_6500i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF965C5-9817-4310-B371-F14A6276FC79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_5500i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF45387F-4411-42C8-9F6B-AD9D779C3AD3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_5500i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C84976C3-4232-4462-9823-FB2BD608BBF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_4500i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E51265-2B64-4113-8810-57D9391770CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_4500i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF0A92B4-D9A2-4AF3-9549-DE942E2D877A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_3500i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C652BEA-9FAC-43FC-A9FB-983DB6BBF582\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_3500i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9D1D3AB-04A3-4DCC-9B8A-2EDF929AD982\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_305_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECF85C19-E7E8-4C61-B55F-3C161E79BF00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6976EACB-CD97-4B39-86CC-44D5E5DCBDDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_255_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2EF4EDC-50B8-42AA-B9FA-B0A2767C473C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_255:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10192A49-0775-44CC-88E8-29D8C57F8CA8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_306i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F75475-2440-4945-AE6A-080E7A649DD8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_306i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E7D6316-816E-4418-B20F-3973E05A47A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:taskalfa_256i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3415C2CD-72BA-45DF-98F2-3BB141B04ED7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:taskalfa_256i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E163F6A5-8F29-4E8C-A141-BDB6BB20BAAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ls-3140mfp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54E85D78-40B4-4066-A6C4-C563328A1B28\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ls-3140mfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B556AA35-6C3F-41C7-BBF7-AB92818236E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ls-3140mfp\\\\+_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A3C6C5C-C5EB-4FFB-AF59-69E775745756\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ls-3140mfp\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5219B353-56A2-4774-A4F2-BF5504E9DEF5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ls-3640mfp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11EF63D5-DFAD-41CC-A16E-7FCADCDB7DB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ls-3640mfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E95ECEB8-C46C-4D8C-A22C-3AB26562C289\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ecosys_m2535dn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8909AB8-4F56-48A0-A6BE-F48669829FF9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ecosys_m2535dn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1C62C98-F320-4B7D-B480-403F97FC3235\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ls-1135mfp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63BB8BD8-8F8A-4C6B-BE28-482456B5FA2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ls-1135mfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4000FBF2-23B5-4F9B-AB25-9889CFFF5059\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ls-1035mfp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824A562D-0767-496F-823E-91D5125F09C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ls-1035mfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB1273E6-6406-4BDE-94AE-41C26274ED45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ls-c8650dn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E21A151C-41F7-4766-A7EA-6BDB7C12F537\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ls-c8650dn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC76E8E5-5A5C-445D-825B-E47CFF131940\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ls-c8600dn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADC7B129-F298-4E66-B473-2BA979B8FB2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ls-c8600dn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E511225-2A40-4C13-832D-978CD5655C8E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ecosys_p6026cdn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7855FF96-4153-4201-9A20-88E2E29354CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ecosys_p6026cdn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9711BDBB-D918-4D17-89FC-FA8079600EEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:fs-c5250dn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB82F83E-DA37-45E7-ACEE-4EA9D49C3BF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:fs-c5250dn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B075117-E601-48CD-92C4-B8BC51E7A344\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ls-4300dn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CEBAF47-DD4C-4D33-8953-274A243D1A46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ls-4300dn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54896C42-F03D-46FD-990B-AC1188599385\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ls-4200dn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECC12D22-B438-40B0-9CDF-D6E9DB8ED91D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ls-4200dn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6C2EA40-009D-40E1-968F-A3D2C7476F3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ls-2100dn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCFC3698-2C88-47D1-BA36-825B9715F6A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ls-2100dn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B42FBD-71CA-494C-872D-75955321FF0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ecosys_p4040dn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC61009-9048-4B81-BEB0-D08ACC478046\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ecosys_p4040dn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0F90FFA-E3D9-43CF-A389-EDF59A280A5D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:ecosys_p2135dn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"786A403C-8B05-474A-95C7-4832AB407894\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:ecosys_p2135dn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8532195-D0E0-4D00-9A8C-289A4ED37B22\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kyocera:fs-1370dn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F597C361-D076-4C44-806B-BC35EBC3AB08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:kyocera:fs-1370dn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA92EBF-550F-468A-99C1-222AC4A20F3B\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/jp/JVN46345126/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.kyoceradocumentsolutions.co.jp/support/information/info_20221101.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2022-11-01.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.