CVE-2022-50932
Unknown Unknown - Not Provided
Directory Traversal in Kyocera ECOSYS M2035dn Allows Sensitive File Access

Publication date: 2026-01-13

Last updated on: 2026-01-13

Assigner: VulnCheck

Description
Kyocera Command Center RX ECOSYS M2035dn contains a directory traversal vulnerability that allows unauthenticated attackers to read sensitive system files by manipulating file paths under the /js/ path. Attackers can exploit the issue by sending requests like /js/../../../../.../etc/passwd%00.jpg (null-byte appended traversal) to access critical files such as /etc/passwd and /etc/shadow.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-13
Last Modified
2026-01-13
Generated
2026-05-07
AI Q&A
2026-01-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
kyocera command_center_rx From 2022-02-10 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2022-50932 is a high-severity directory traversal vulnerability in the Kyocera Command Center RX ECOSYS M2035dn printer. It allows unauthenticated attackers to read sensitive system files by manipulating file paths within the /js/ directory. Attackers exploit this by sending specially crafted requests that include directory traversal sequences combined with a null byte (e.g., /js/../../../../.../etc/passwd%00.jpg), which tricks the system into disclosing critical files such as /etc/passwd and /etc/shadow without requiring any authentication. [1, 2]


How can this vulnerability impact me? :

This vulnerability can have a significant impact by allowing remote, unauthenticated attackers to access sensitive system files on the affected printer. Access to files like /etc/passwd and /etc/shadow can expose user account information and hashed passwords, potentially leading to further attacks such as privilege escalation or unauthorized access to the device or network. Since no authentication or user interaction is required, the risk of exploitation is high, compromising confidentiality of the system. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending crafted HTTP GET requests to the affected device's /js/ path, attempting directory traversal with null byte termination to access sensitive files. For example, using curl commands: 1. curl -i http://<device-ip>/js/../../../../../../../../etc/passwd%00.jpg 2. curl -i http://<device-ip>/js/../../../../../../../../etc/shadow%00.jpg If the server responds with HTTP 200 OK and returns file contents, the device is vulnerable. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart