Session information easily guessable vulnerability exists in Kyocera Document Solutions MFPs and printers, which may allow a network-adjacent attacker to log in to the product by spoofing a user with guessed session information. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN.

Project Subscriptions

Vendors Products
Kyocera Subscribe
Ecosys M2535dn Subscribe
Ecosys M2535dn Firmware Subscribe
Ecosys M6526cdn Subscribe
Ecosys M6526cdn Firmware Subscribe
Ecosys M6526cidn Subscribe
Ecosys M6526cidn Firmware Subscribe
Ecosys P2135dn Subscribe
Ecosys P2135dn Firmware Subscribe
Ecosys P4040dn Subscribe
Ecosys P4040dn Firmware Subscribe
Ecosys P6026cdn Subscribe
Ecosys P6026cdn Firmware Subscribe
Fs-1370dn Subscribe
Fs-1370dn Firmware Subscribe
Fs-c2026mfp Subscribe
Fs-c2026mfp Firmware Subscribe
Fs-c2126mfp Subscribe
Fs-c2126mfp\+ Subscribe
Fs-c2126mfp\+ Firmware Subscribe
Fs-c2126mfp Firmware Subscribe
Fs-c5250dn Subscribe
Fs-c5250dn Firmware Subscribe
Ls-1035mfp Subscribe
Ls-1035mfp Firmware Subscribe
Ls-1135mfp Subscribe
Ls-1135mfp Firmware Subscribe
Ls-2100dn Subscribe
Ls-2100dn Firmware Subscribe
Ls-3140mfp Subscribe
Ls-3140mfp\+ Subscribe
Ls-3140mfp\+ Firmware Subscribe
Ls-3140mfp Firmware Subscribe
Ls-3640mfp Subscribe
Ls-3640mfp Firmware Subscribe
Ls-4200dn Subscribe
Ls-4200dn Firmware Subscribe
Ls-4300dn Subscribe
Ls-4300dn Firmware Subscribe
Ls-c8600dn Subscribe
Ls-c8600dn Firmware Subscribe
Ls-c8650dn Subscribe
Ls-c8650dn Firmware Subscribe
Taskalfa 205c Subscribe
Taskalfa 205c Firmware Subscribe
Taskalfa 206ci Subscribe
Taskalfa 206ci Firmware Subscribe
Taskalfa 255 Subscribe
Taskalfa 255 Firmware Subscribe
Taskalfa 255c Subscribe
Taskalfa 255c Firmware Subscribe
Taskalfa 256ci Subscribe
Taskalfa 256ci Firmware Subscribe
Taskalfa 256i Subscribe
Taskalfa 256i Firmware Subscribe
Taskalfa 305 Subscribe
Taskalfa 3050ci Subscribe
Taskalfa 3050ci Firmware Subscribe
Taskalfa 305 Firmware Subscribe
Taskalfa 306i Subscribe
Taskalfa 306i Firmware Subscribe
Taskalfa 3500i Subscribe
Taskalfa 3500i Firmware Subscribe
Taskalfa 3550ci Subscribe
Taskalfa 3550ci Firmware Subscribe
Taskalfa 4500i Subscribe
Taskalfa 4500i Firmware Subscribe
Taskalfa 4550ci Subscribe
Taskalfa 4550ci Firmware Subscribe
Taskalfa 5500i Subscribe
Taskalfa 5500i Firmware Subscribe
Taskalfa 5550ci Subscribe
Taskalfa 5550ci Firmware Subscribe
Taskalfa 6500i Subscribe
Taskalfa 6500i Firmware Subscribe
Taskalfa 6550ci Subscribe
Taskalfa 6550ci Firmware Subscribe
Taskalfa 7550ci Subscribe
Taskalfa 7550ci Firmware Subscribe
Taskalfa 8000i Subscribe
Taskalfa 8000i Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-44966 Session information easily guessable vulnerability exists in Kyocera Document Solutions MFPs and printers, which may allow a network-adjacent attacker to log in to the product by spoofing a user with guessed session information. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 24 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2025-04-24T14:30:52.508Z

Reserved: 2022-10-22T00:00:00.000Z

Link: CVE-2022-41798

cve-icon Vulnrichment

Updated: 2024-08-03T12:56:37.889Z

cve-icon NVD

Status : Modified

Published: 2022-12-05T04:15:09.967

Modified: 2025-04-24T15:15:49.100

Link: CVE-2022-41798

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses