# 京瓷Net View地址簿信息泄露漏洞
## 概述
Kyocera多功能打印机运行易受攻击版本的Net View时,会无意中通过保护不足的地址簿导出功能泄露敏感用户信息,包括用户名和密码。
## 影响版本
未具体提及受影响的Net View版本。
## 细节
易受攻击的版本因地址簿导出功能保护不足,无意中泄露了包括用户名和密码在内的敏感用户信息。
## 影响
可能泄露用户的敏感信息,包括用户名和密码,导致潜在的安全风险。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain joined passwords | https://github.com/ac3lives/kyocera-cve-2022-1026 | POC详情 |
2 | NSE port of CVE-2022-1026 exploit for mass identification and exploitation | https://github.com/flamebarke/nmap-printer-nse-scripts | POC详情 |
3 | Improved Golang Version of Rapid7 PoC for CVE-2022-1026 | https://github.com/r0lh/kygocera | POC详情 |
4 | Kyocera multifunction printers running vulnerable versions of Net View unintentionally expose sensitive user information, including usernames and passwords, through an insufficiently protected address book export function. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-1026.yaml | POC详情 |
暂无评论