Please enter your username or email. We’ll send you an email with instructions on how to reset your password. If you have forgotten your username, did not receive the email to reset your password or need help, contact our support team.
Hvis du har skrevet en korrekt e-mail i vores database, svarer vi indenfor...
You can request a new account by submitting your details to your local sales centre. Upon approval, we will email you a temporary password.
At present, registered users are restricted to Partners and Employees of Kyocera Document Solutions. Please note that your local legacy Extranet are still available and accessible to you via the button below.
A security vulnerability has been identified in KYOCERA Net Manager a Document output management software provided by KYOCERA Document Solutions. The following is an overview of the issue and how to resolve it. As of the date of publication of this notice, we have not confirmed any attacks that take advantage of this vulnerability.
Issue 1. Leakage of user information
In environments where KYOCERA Net Manager is used, it is possible for
non-administrators to obtain the hashes of usernames and passwords managed by the KYOCERA Net Manager print server.
Issue 2. Leakage of Print Server file list
In environments where KYOCERA Net Manager is used, you can use the browser feature to see the directory structure of Print Server and Central Server of KYOCERA Net Manager.
Issue 3. Leakage of user information
In environments where KYOCERA Net Manager is used, non-administrators can obtain the user list managed by Print Server and Central Server of KYOCERA Net Manager by opening URL.
Issue 4. Remote code Execution
In environments where KYOCERA Net Manager is used, you can execute remote code in Print Server without privileges.
Vulnerability number: CVE-2021-31769
KYOCERA Document Solutions offers updated software to address security vulnerabilities. We recommend that you upgrade to the latest version, 8.2, to ensure system security.
Please contact the Kyocera Document Solutions sales company / partner in your region for information on changing the software.
For more information on how this vulnerability affects products, please contact your local distributor where you purchased the product.
Click here for more information