VAR-200602-0272

Vulnerability from variot - Updated: 2023-12-18 13:49

Kyocera 3830 (aka FS-3830N) printers have a back door that allows remote attackers to read and alter configuration settings via strings that begin with "!R!SIOP0", as demonstrated using (1) a connection to to TCP port 9100 or (2) the UNIX lp command. Kyocera 3830 printer is prone to an unauthorized access vulnerability. This issue is due to a failure in the application to perform proper authentication before granting access to printer functions. An attacker can exploit this issue to set arbitrary printer configuration settings. The impact of successful exploitation will vary depending on the settings reconfigured.

TITLE: Kyocera FS-3830N Configuration Modification Security Issue

SECUNIA ADVISORY ID: SA18896

VERIFY ADVISORY: http://secunia.com/advisories/18896/

CRITICAL: Less critical

IMPACT: Manipulation of data, Exposure of system information

WHERE:

From local network

OPERATING SYSTEM: Kyocera FS-3830N http://secunia.com/product/8101/

DESCRIPTION: evader has reported a security issue in Kyocera FS-3830N Printer, which can be exploited by malicious people to gain knowledge of or potentially to modify certain system information. This may be exploited to disclose and modify the configured settings.

Note: It has also been reported that other network-enabled Kyocera printers have a default username "admin" and blank password for the telnet configuration port.

PROVIDED AND/OR DISCOVERED BY: evader

ORIGINAL ADVISORY: http://evader.wordpress.com/2006/02/16/kyocera-printers/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200602-0272",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "fs-3830n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kyocera",
        "version": "*"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.6,
        "vendor": "no",
        "version": null
      },
      {
        "model": "fs-3830n",
        "scope": null,
        "trust": 0.6,
        "vendor": "kyocera",
        "version": null
      },
      {
        "model": "fs-3830n printer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kyocera",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-0960"
      },
      {
        "db": "BID",
        "id": "16685"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0788"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-299"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:kyocera:fs-3830n:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0788"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "evader is credited with the discovery of this vulnerability.",
    "sources": [
      {
        "db": "BID",
        "id": "16685"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-299"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2006-0788",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2006-0960",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2006-0788",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2006-0960",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200602-299",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-0960"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0788"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-299"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kyocera 3830 (aka FS-3830N) printers have a back door that allows remote attackers to read and alter configuration settings via strings that begin with \"!R!SIOP0\", as demonstrated using (1) a connection to to TCP port 9100 or (2) the UNIX lp command. Kyocera 3830 printer is prone to an unauthorized access vulnerability. This issue is due to a failure in the application to perform proper authentication before granting access to printer functions. \nAn attacker can exploit this issue to set arbitrary printer configuration settings. The impact of successful exploitation will vary depending on the settings reconfigured. \n\nTITLE:\nKyocera FS-3830N Configuration Modification Security Issue\n\nSECUNIA ADVISORY ID:\nSA18896\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/18896/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nManipulation of data, Exposure of system information\n\nWHERE:\n\u003eFrom local network\n\nOPERATING SYSTEM:\nKyocera FS-3830N\nhttp://secunia.com/product/8101/\n\nDESCRIPTION:\nevader has reported a security issue in Kyocera FS-3830N Printer,\nwhich can be exploited by malicious people to gain knowledge of or\npotentially to modify certain system information. This may be exploited to disclose\nand modify the configured settings. \n\nNote: It has also been reported that other network-enabled Kyocera\nprinters have a default username \"admin\" and blank password for the\ntelnet configuration port. \n\nPROVIDED AND/OR DISCOVERED BY:\nevader\n\nORIGINAL ADVISORY:\nhttp://evader.wordpress.com/2006/02/16/kyocera-printers/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0788"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-0960"
      },
      {
        "db": "BID",
        "id": "16685"
      },
      {
        "db": "PACKETSTORM",
        "id": "43916"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "16685",
        "trust": 2.5
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0788",
        "trust": 2.2
      },
      {
        "db": "SECUNIA",
        "id": "18896",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-0620",
        "trust": 1.6
      },
      {
        "db": "OSVDB",
        "id": "23245",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-0960",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "3830",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "24772",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20060215 KYOCERA NETWORK PRINTERS",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-299",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "43916",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-0960"
      },
      {
        "db": "BID",
        "id": "16685"
      },
      {
        "db": "PACKETSTORM",
        "id": "43916"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0788"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-299"
      }
    ]
  },
  "id": "VAR-200602-0272",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-0960"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-0960"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:49:53.217000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0788"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "http://www.securityfocus.com/bid/16685"
      },
      {
        "trust": 2.0,
        "url": "http://evader.wordpress.com/2006/02/16/kyocera-printers/"
      },
      {
        "trust": 1.6,
        "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0344.html"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/18896"
      },
      {
        "trust": 1.6,
        "url": "http://www.osvdb.org/23245"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2006/0620"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24772"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/0620"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/24772"
      },
      {
        "trust": 0.3,
        "url": "http://www.kyoceramita-europe.com/html/view/products/viewproduct.asp?idproduct=705\u0026idfeature=1"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/18896/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/8101/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-0960"
      },
      {
        "db": "BID",
        "id": "16685"
      },
      {
        "db": "PACKETSTORM",
        "id": "43916"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0788"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-299"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-0960"
      },
      {
        "db": "BID",
        "id": "16685"
      },
      {
        "db": "PACKETSTORM",
        "id": "43916"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0788"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-299"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-02-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-0960"
      },
      {
        "date": "2006-02-16T00:00:00",
        "db": "BID",
        "id": "16685"
      },
      {
        "date": "2006-02-16T21:45:30",
        "db": "PACKETSTORM",
        "id": "43916"
      },
      {
        "date": "2006-02-19T11:02:00",
        "db": "NVD",
        "id": "CVE-2006-0788"
      },
      {
        "date": "2006-02-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200602-299"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-02-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-0960"
      },
      {
        "date": "2006-02-17T01:02:00",
        "db": "BID",
        "id": "16685"
      },
      {
        "date": "2017-07-20T01:30:04.287000",
        "db": "NVD",
        "id": "CVE-2006-0788"
      },
      {
        "date": "2006-02-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200602-299"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-299"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kyocera 3830 Printer Unauthorized Access Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-0960"
      },
      {
        "db": "BID",
        "id": "16685"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "access verification error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-299"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…