Vulnerability Details : CVE-2022-41798
Session information easily guessable vulnerability exists in Kyocera Document Solutions MFPs and printers, which may allow a network-adjacent attacker to log in to the product by spoofing a user with guessed session information. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN.
Products affected by CVE-2022-41798
- cpe:2.3:o:kyocera:taskalfa_7550ci_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_6550ci_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_5550ci_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_4550ci_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_3550ci_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_3050ci_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_255c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_205c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_256ci_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_206ci_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ecosys_m6526cdn_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ecosys_m6526cidn_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:fs-c2126mfp_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:fs-c2126mfp\+_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:fs-c2026mfp_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_8000i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_6500i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_5500i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_4500i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_3500i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_305_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_255_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_306i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:taskalfa_256i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ls-3140mfp_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ls-3140mfp\+_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ls-3640mfp_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ecosys_m2535dn_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ls-1135mfp_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ls-1035mfp_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ls-c8650dn_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ls-c8600dn_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ecosys_p6026cdn_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:fs-c5250dn_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ls-4300dn_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ls-4200dn_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ls-2100dn_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ecosys_p4040dn_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:ecosys_p2135dn_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:kyocera:fs-1370dn_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-41798
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 45 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-41798
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2022-41798
-
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-41798
-
https://www.kyoceradocumentsolutions.co.jp/support/information/info_20221101.html
京セラ製複合機・プリンターのセキュリティー脆弱性について | 京セラドキュメントソリューションズMitigation;Vendor Advisory
-
https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2022-11-01.html
Security vulnerabilities in our products | KYOCERA Document SolutionsThird Party Advisory
-
https://jvn.jp/en/jp/JVN46345126/index.html
JVN#46345126: Multiple vulnerabilities in the web interfaces of Kyocera Document Solutions MFPs and printersVendor Advisory
Jump to