CVE-2022-50932
Directory Traversal in Kyocera ECOSYS M2035dn Allows Sensitive File Access
Publication date: 2026-01-13
Last updated on: 2026-01-13
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| kyocera | command_center_rx | From 2022-02-10 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2022-50932 is a high-severity directory traversal vulnerability in the Kyocera Command Center RX ECOSYS M2035dn printer. It allows unauthenticated attackers to read sensitive system files by manipulating file paths within the /js/ directory. Attackers exploit this by sending specially crafted requests that include directory traversal sequences combined with a null byte (e.g., /js/../../../../.../etc/passwd%00.jpg), which tricks the system into disclosing critical files such as /etc/passwd and /etc/shadow without requiring any authentication. [1, 2]
How can this vulnerability impact me? :
This vulnerability can have a significant impact by allowing remote, unauthenticated attackers to access sensitive system files on the affected printer. Access to files like /etc/passwd and /etc/shadow can expose user account information and hashed passwords, potentially leading to further attacks such as privilege escalation or unauthorized access to the device or network. Since no authentication or user interaction is required, the risk of exploitation is high, compromising confidentiality of the system. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by sending crafted HTTP GET requests to the affected device's /js/ path, attempting directory traversal with null byte termination to access sensitive files. For example, using curl commands: 1. curl -i http://<device-ip>/js/../../../../../../../../etc/passwd%00.jpg 2. curl -i http://<device-ip>/js/../../../../../../../../etc/shadow%00.jpg If the server responds with HTTP 200 OK and returns file contents, the device is vulnerable. [2]