all InfoSec news
Kyocera Printers Open to Path Traversal Attacks
Jan. 9, 2024, 8:10 p.m. |
GovInfoSecurity.com RSS Syndication www.govinfosecurity.com
Researchers found a path traversal vulnerability in Kyocera's Device Manager product, which is used for overseeing large printer fleets in mid- to large-sized enterprises. Attackers could exploit the flaw to obtain NTLM hashes by changing the location of a backup database.
attackers attacks backup changing database device device manager enterprises exploit flaw found hashes kyocera large location malicious malicious actors manager ntlm ntlm hashes path path traversal path traversal attacks path traversal vulnerability printer printers product vulnerability
More from www.govinfosecurity.com / GovInfoSecurity.com RSS Syndication
Jobs in InfoSec / Cybersecurity
Security Specialist
@ Nestlé | St. Louis, MO, US, 63164
Cybersecurity Analyst
@ Dana Incorporated | Pune, MH, IN, 411057
Sr. Application Security Engineer
@ CyberCube | United States
Linux DevSecOps Administrator (Remote)
@ Accenture Federal Services | Arlington, VA
Cyber Security Intern or Co-op
@ Langan | Parsippany, NJ, US, 07054-2172
Security Advocate - Application Security
@ Datadog | New York, USA, Remote