CVE-2026-2464

N/A Unknown

📋 TL;DR

This is an unauthenticated path traversal vulnerability in AMR Printer Management 1.01 Beta web service that allows attackers to read arbitrary files from the underlying Windows system. The service runs with elevated privileges and requires no authentication, making exploitation trivial. Any organization using this vulnerable software version is affected.

💻 Affected Systems

Products:
  • AMR Printer Management
Versions: 1.01 Beta
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The web service runs with elevated privileges and is accessible without authentication by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading of sensitive files like SAM database, configuration files, or private keys, potentially leading to lateral movement and domain takeover.

🟠

Likely Case

Unauthorized access to sensitive system files, configuration data, and potentially credentials stored on the affected system.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the vulnerable service.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires only path traversal sequences in web requests and no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/directory-traversal-amr-printer-management-amr

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Network Access Restriction

windows

Restrict network access to the AMR Printer Management service using firewall rules to only allow trusted IP addresses.

Windows Firewall: New-NetFirewallRule -DisplayName "Block AMR Printer Management" -Direction Inbound -Program "C:\Path\To\AMRPrinterManagement.exe" -Action Block

Service Account Privilege Reduction

windows

Change the service account to run with minimal required privileges instead of elevated/system privileges.

sc.exe config "AMRPrinterManagement" obj= "NT AUTHORITY\LocalService" password= ""

🧯 If You Can't Patch

  • Disable or uninstall the AMR Printer Management service if not required
  • Implement strict network segmentation to isolate the vulnerable system from critical assets

🔍 How to Verify

Check if Vulnerable:

Check if AMR Printer Management version 1.01 Beta is installed and the web service is running on port 80/8080 or configured ports.

Check Version:

Check program files directory or registry: HKEY_LOCAL_MACHINE\SOFTWARE\AMR Printer Management

Verify Fix Applied:

Verify the service is no longer accessible or has been updated to a newer version. Test with path traversal payloads to confirm remediation.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing path traversal sequences (../, ..\) to the AMR Printer Management service
  • Multiple failed file access attempts from single source

Network Indicators:

  • Unusual file read patterns from the printer management service
  • External IP addresses accessing internal printer management web interface

SIEM Query:

source="web_logs" AND uri="*AMR*" AND (uri="*../*" OR uri="*..\*")

🔗 References

📤 Share & Export