"Kyocera Device Manager Vulnerability Exposes Enterprise Credentials"

Security researchers at Trustwave are warning organizations of a vulnerability in Kyocera Device Manager that can be exploited to capture credentials and gain access to accounts and devices.  A web-based application, the Kyocera Device Manager is used for the management of multiple Kyocera printers and multifunction devices within an organization’s environment, offering support for application deployment, setting up alerts, and more.  The researchers noted that the issue, tracked as CVE-2023-50916, allows an attacker to bypass input restrictions and submit a backup path allowing them to alter the path parameter value to a network path (UNC) under their control.  Although the application rejects certain characters in the path parameter, an attacker could use a web interception proxy to modify the request or could send the request directly to the application, which will then accept the UNC path.  Next, the Kyocera Device Manager will attempt to confirm access and to authenticate to the UNC path, allowing the attacker to capture or relay Active Directory hashed credentials.  The vendor patched the vulnerability in Kyocera Device Manager version 3.1.1213.0 by implementing a validation function to ignore any supplied invalid paths and apply the original valid path instead.  Organizations are advised to update their instances as soon as possible, as successful exploitation of the bug could lead to a broad range of nefarious activities.

 

SecurityWeek reports: "Kyocera Device Manager Vulnerability Exposes Enterprise Credentials"

Submitted by Adam Ekwall on