Security Announcements

GNU Bash "Shellshock" Security Vulnerability

November 13, 2014

A critical security vulnerability has been reported in the GNU Bash "Shellshock", which is a common command line used in many Linux/UNIX operating systems.
KYOCERA has investigated whether or not its products, software and services are affected. The results are as follows.

KYOCERA products use a special embedded version of the Linux Operating System. There is no access to the Bash prompt from the network, operation panel, USB, or any other interface, therefore, KYOCERA printers and MFPs are not susceptible to the “Shellshock” vulnerability.

Connectivity Options
"Bash" environment is not implemented in following KYOCERA optional products, and therefore unaffected.
FAX System (*)
IB-23/IB-50/IB-51 / IB-110

Software, Utilities
"Bash" environment is not implemented in any KYOCERA software/utilities and therefore unaffected.

EFI™ Fiery Printing System(s)
The Fiery Printing System, optional on select KYOCERA color MFPs, uses an embedded Linux Operating System. EFI, the manufacturer of Fiery Printing Systems, has identified a vulnerability that they regard as a low security risk. EFI is currently working on a firmware patch, which will resolve this vulnerability, and it will be made available after December 1, 2014.

Shellshock Vulnerability in KYOCERA MFPs/Printers

October 03rd, 2014

Dear Customers,
Since some days security forums in the internet report about the availability of a new serious exploit named "Shellshock"
The "Shellshock" bug has been compared to "Heartbleed" partly because the software at the heart of the "Shellshock" bug, known as Bash, is also widely used in web servers and other types of devices such as e.g. printing and MFP devices.
But the good news is that not all computers running Bash are vulnerable by the “Shellshock” exploited.
Kyocera likes to inform our customers that the Kyocera devices and software listed up blow will be not vulnerable by the “Shellshock” exploit.

*Only the Fiery Printing System is still under investigation, the result of investigation will be informed soon.





Scroll to top