Jan. 9, 2024, 8:10 p.m. |

GovInfoSecurity.com RSS Syndication www.govinfosecurity.com

Path Traversal Flaw Allows Malicious Actors to Exploit Kyocera's Device Manager
Researchers found a path traversal vulnerability in Kyocera's Device Manager product, which is used for overseeing large printer fleets in mid- to large-sized enterprises. Attackers could exploit the flaw to obtain NTLM hashes by changing the location of a backup database.

attackers attacks backup changing database device device manager enterprises exploit flaw found hashes kyocera large location malicious malicious actors manager ntlm ntlm hashes path path traversal path traversal attacks path traversal vulnerability printer printers product vulnerability

Security Specialist

@ Nestlé | St. Louis, MO, US, 63164

Cybersecurity Analyst

@ Dana Incorporated | Pune, MH, IN, 411057

Sr. Application Security Engineer

@ CyberCube | United States

Linux DevSecOps Administrator (Remote)

@ Accenture Federal Services | Arlington, VA

Cyber Security Intern or Co-op

@ Langan | Parsippany, NJ, US, 07054-2172

Security Advocate - Application Security

@ Datadog | New York, USA, Remote