CVE-2022-1026

HIGH EXPLOITED NUCLEI

Kyocera Net Viewer - Insufficiently Protected Credentials

Title source: rule

Description

Kyocera multifunction printers running vulnerable versions of Net View unintentionally expose sensitive user information, including usernames and passwords, through an insufficiently protected address book export function.

Exploits (4)

nomisec WORKING POC 18 stars
by ac3lives · remote
https://github.com/ac3lives/kyocera-cve-2022-1026
nomisec NO CODE 2 stars
by flamebarke · infoleak
https://github.com/flamebarke/nmap-printer-nse-scripts
nomisec WORKING POC 2 stars
by h4po0n · infoleak
https://github.com/h4po0n/kyocera-cve-2022-1026_SOAP1.1
nomisec WORKING POC
by r0lh · infoleak
https://github.com/r0lh/kygocera

Nuclei Templates (1)

Kyocera Net View Address Book Exposure
HIGHby DhiyaneshDK
Shodan: product:"Kyocera Printer Panel"

Scores

CVSS v3 8.6
EPSS 0.8759
EPSS Percentile 99.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Exploitation Intel

VulnCheck KEV 2024-06-08

Classification

CWE
CWE-522
Status published

Affected Products (1)

kyocera/net_viewer < 2s0_1000.005.0012s5_2000.002.505

Timeline

Published Apr 04, 2022
Tracked Since Feb 18, 2026