CVE-2022-1026
HIGH EXPLOITED NUCLEIKyocera Net Viewer - Insufficiently Protected Credentials
Title source: ruleDescription
Kyocera multifunction printers running vulnerable versions of Net View unintentionally expose sensitive user information, including usernames and passwords, through an insufficiently protected address book export function.
Exploits (4)
nomisec
NO CODE
2 stars
by flamebarke · infoleak
https://github.com/flamebarke/nmap-printer-nse-scripts
nomisec
WORKING POC
2 stars
by h4po0n · infoleak
https://github.com/h4po0n/kyocera-cve-2022-1026_SOAP1.1
Nuclei Templates (1)
Kyocera Net View Address Book Exposure
HIGHby DhiyaneshDK
Shodan:
product:"Kyocera Printer Panel"
Scores
CVSS v3
8.6
EPSS
0.8759
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Exploitation Intel
VulnCheck KEV
2024-06-08
Classification
CWE
CWE-522
Status
published
Affected Products (1)
kyocera/net_viewer
< 2s0_1000.005.0012s5_2000.002.505
Timeline
Published
Apr 04, 2022
Tracked Since
Feb 18, 2026