Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-41830: Cross-site scripting in KYOCERA Document Solutions Inc. Kyocera Document Solutions MFPs and printers

0
Medium
Published: Mon Dec 05 2022 (12/05/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: KYOCERA Document Solutions Inc.
Product: Kyocera Document Solutions MFPs and printers

Description

Stored cross-site scripting vulnerability in Kyocera Document Solutions MFPs and printers allows a remote authenticated attacker with an administrative privilege to inject arbitrary script. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN.

AI-Powered Analysis

AILast updated: 06/24/2025, 04:10:51 UTC

Technical Analysis

CVE-2022-41830 is a stored cross-site scripting (XSS) vulnerability affecting a broad range of Kyocera Document Solutions multifunction printers (MFPs) and printers. This vulnerability allows a remote attacker who has authenticated administrative privileges on the affected device to inject arbitrary malicious scripts into the device's web interface. The vulnerability is classified as CWE-79, indicating improper neutralization of input leading to XSS. The affected products include numerous TASKalfa series models (e.g., 7550ci, 6550ci, 5550ci, 4550ci, 3550ci, 3050ci, 255c, 205c, 256ci, 206ci, 8000i, 6500i, 5500i, 4500i, 3500i, 305, 255, 306i, 256i), ECOSYS models (M6526cdn, M6526cidn, M2535dn, P6026cdn, P4040dn, P2135dn), FS series (C2126MFP, C2126MFP+, C2026MFP, C2026MFP+, C5250DN, 1370DN), and LS series (3140MFP, 3140MFP+, 3640MFP, 1135MFP, 1035MFP, C8650DN, C8600DN, 4300DN, 4200DN, 2100DN). The vulnerability requires the attacker to have administrative privileges and some user interaction, such as accessing the device's web interface, to exploit. The CVSS v3.1 base score is 4.8 (medium severity), with vector AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, high privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. Exploitation could allow the attacker to execute arbitrary scripts in the context of the device's management interface, potentially leading to session hijacking, unauthorized actions, or further compromise of the device or connected network. No known exploits in the wild have been reported to date. The vulnerability stems from insufficient input sanitization in the web interface of the affected devices, allowing malicious script injection that is stored and executed when accessed by legitimate users or administrators.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially in environments where Kyocera MFPs and printers are widely deployed and integrated into critical business workflows. Exploitation could allow an attacker with administrative credentials to execute malicious scripts, potentially leading to unauthorized access to sensitive information, manipulation of print jobs, or pivoting to other internal systems. Given that many organizations rely on these devices for document handling, including confidential and regulated data, the integrity and confidentiality of information could be compromised. Additionally, the vulnerability could be leveraged to conduct further attacks such as credential theft or lateral movement within the network. The requirement for administrative privileges limits the attack surface but does not eliminate risk, as credential compromise or insider threats could enable exploitation. The medium CVSS score reflects moderate risk; however, in high-security environments such as government agencies, financial institutions, or healthcare providers in Europe, even medium-severity vulnerabilities in networked devices can have outsized consequences. The lack of known public exploits reduces immediate risk but does not preclude targeted attacks or future exploit development.

Mitigation Recommendations

Apply vendor-supplied firmware updates or patches as soon as they become available to address the XSS vulnerability. Restrict administrative access to the printer's web interface by implementing network segmentation and access control lists (ACLs) to limit management interface exposure to trusted administrators only. Enforce strong authentication mechanisms for administrative accounts, including complex passwords and, where supported, multi-factor authentication (MFA). Regularly audit and monitor administrative access logs for unusual or unauthorized activity to detect potential exploitation attempts early. Disable unnecessary web interface features or services on the devices that are not required for business operations to reduce the attack surface. Implement strict input validation and sanitization policies on any custom integrations or scripts interacting with the printer's web interface, if applicable. Educate administrators on the risks of XSS and the importance of cautious interaction with device management interfaces, especially when handling unexpected or suspicious inputs. Consider deploying web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) that can detect and block malicious script payloads targeting the printer's management interface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2022-10-22T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1276

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 4:10:51 AM

Last updated: 2/7/2026, 4:24:36 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats