ID

VAR-202003-0793


CVE

CVE-2019-13195


TITLE

Kyocera ECOSYS M5526CDW path traversal vulnerability

Trust: 1.2

sources: CNVD: CNVD-2020-20973 // CNNVD: CNNVD-202003-857

DESCRIPTION

The web application of some Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) was vulnerable to path traversal, allowing an unauthenticated user to retrieve arbitrary files, or check if files or folders existed within the file system. plural Kyocera A past traversal vulnerability exists in the printer.Information may be obtained. Kyocera ECOSYS M5526CDW is a multi-function printer of Kyocera Corporation of Japan. Kyocera ECOSYS M5526CDW 2R7_2000.001.701 version of the web application has a path traversal vulnerability, the vulnerability stems from the network system or product fails to correctly filter the special elements in the resource or file path, the attacker can use the vulnerability to access the restricted directory Outside location

Trust: 2.16

sources: NVD: CVE-2019-13195 // JVNDB: JVNDB-2019-015070 // CNVD: CNVD-2020-20973

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-20973

AFFECTED PRODUCTS

vendor:kyoceramodel:ecosys m5526cdwscope:eqversion:2r7_2000.001.701

Trust: 1.8

vendor:kyoceramodel:ecosys m5526cdw 2r7 2000.001.701scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2020-20973 // JVNDB: JVNDB-2019-015070 // NVD: CVE-2019-13195

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-13195
value: HIGH

Trust: 1.0

NVD: JVNDB-2019-015070
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-20973
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202003-857
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2019-13195
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2019-015070
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-20973
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-13195
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2019-015070
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-20973 // JVNDB: JVNDB-2019-015070 // CNNVD: CNNVD-202003-857 // NVD: CVE-2019-13195

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

sources: JVNDB: JVNDB-2019-015070 // NVD: CVE-2019-13195

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202003-857

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202003-857

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-015070

PATCH

title:カラーA4複合機・コピー機:ECOSYS M5526cdwurl:https://www.kyoceradocumentsolutions.co.jp/products/color-multifunction/ecosys-m5526cdw/

Trust: 0.8

title:Patch for Kyocera ECOSYS M5526CDW path traversal vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/212087

Trust: 0.6

title:Kyocera ECOSYS M5526cdw Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=112077

Trust: 0.6

sources: CNVD: CNVD-2020-20973 // JVNDB: JVNDB-2019-015070 // CNNVD: CNNVD-202003-857

EXTERNAL IDS

db:NVDid:CVE-2019-13195

Trust: 3.0

db:JVNDBid:JVNDB-2019-015070

Trust: 0.8

db:CNVDid:CNVD-2020-20973

Trust: 0.6

db:CNNVDid:CNNVD-202003-857

Trust: 0.6

sources: CNVD: CNVD-2020-20973 // JVNDB: JVNDB-2019-015070 // CNNVD: CNNVD-202003-857 // NVD: CVE-2019-13195

REFERENCES

url:https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-kyocera-printers/

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-13195

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-13195

Trust: 0.8

sources: CNVD: CNVD-2020-20973 // JVNDB: JVNDB-2019-015070 // CNNVD: CNNVD-202003-857 // NVD: CVE-2019-13195

SOURCES

db:CNVDid:CNVD-2020-20973
db:JVNDBid:JVNDB-2019-015070
db:CNNVDid:CNNVD-202003-857
db:NVDid:CVE-2019-13195

LAST UPDATE DATE

2024-11-23T22:44:38.843000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-20973date:2020-04-02T00:00:00
db:JVNDBid:JVNDB-2019-015070date:2020-04-02T00:00:00
db:CNNVDid:CNNVD-202003-857date:2020-04-02T00:00:00
db:NVDid:CVE-2019-13195date:2024-11-21T04:24:25.790

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-20973date:2020-04-02T00:00:00
db:JVNDBid:JVNDB-2019-015070date:2020-04-02T00:00:00
db:CNNVDid:CNNVD-202003-857date:2020-03-13T00:00:00
db:NVDid:CVE-2019-13195date:2020-03-13T19:15:16.133