Connect with us

Hi, what are you looking for?



Kyocera Device Manager Vulnerability Exposes Enterprise Credentials

An improper input validation flaw in Kyocera Device Manager allows attackers to capture credentials, compromise accounts.

Organizations have been warned of a vulnerability in Kyocera Device Manager that can be exploited to capture credentials and gain access to accounts and devices.

A web-based application, the Kyocera Device Manager is used for the management of multiple Kyocera printers and multifunction devices within an organization’s environment, offering support for application deployment, setting up alerts, and more.

In December, Trustwave identified and reported an improper input validation flaw in the ‘path’ parameter of a Kyocera Device Manager function that handles requests to set the database backup location.

The issue, tracked as CVE-2023-50916, allows an attacker to bypass input restrictions and submit a backup path allowing them to alter the path parameter value to a network path (UNC) under their control.

Although the application rejects certain characters in the path parameter, an attacker could use a web interception proxy to modify the request or could send the request directly to the application, which will then accept the UNC path.

Next, the Kyocera Device Manager will attempt to confirm access and to authenticate to the UNC path, allowing the attacker to capture or relay Active Directory hashed credentials, Trustwave explains in a technical writeup.

Kyocera confirmed the potential risk in a December 2023 advisory: “Upon receiving the UNC path, Kyocera Device Manager will attempt to confirm the access and then will try to authenticate the UNC path. The attacker can possibly exploit UNC path authentication.”

The electronics manufacturer pointed out that the issue can be exploited by an authenticated attacker with direct access to the same network as the Kyocera Device Manager.

Advertisement. Scroll to continue reading.

The vendor patched the vulnerability in Kyocera Device Manager version 3.1.1213.0 by implementing a validation function to ignore any supplied invalid paths and apply the original valid path instead.

Organizations are advised to update their instances as soon as possible, as successful exploitation of the bug could lead to a broad range of nefarious activities.

“There is a risk of authentication information leakage if the attacker successfully obtains the authentication information, they can gain unauthorized access to clients’ accounts, steal data, or carry out malicious activities on Kyocera product devices,” Kyocera said.

Related: CISA Warns of Apache Superset Vulnerability Exploitation

Related: QNAP Patches High-Severity Flaws in QTS, Video Station, QuMagie, Netatalk Products

Related: Vulnerability Handling in 2023: 28,000 New CVEs, 84 New CNAs

Written By

Ionut Arghire is an international correspondent for SecurityWeek.


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...


A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.