Path traversal vulnerability in the AMR Printer Management 1.01 Beta web service, which allows remote attackers to read arbitrary files from the underlying Windows system by using specially crafted path traversal sequences in requests directed to the web management service. The service is accessible without authentication and runs with elevated privileges, amplifying the impact of the vulnerability. An attacker can exploit this condition to access sensitive and privileged files on the system using path traversal payloads. Successful exploitation of this vulnerability could lead to the unauthorized disclosure of internal system information, compromising the confidentiality of the affected environment.
History

Wed, 18 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Description Path traversal vulnerability in the AMR Printer Management 1.01 Beta web service, which allows remote attackers to read arbitrary files from the underlying Windows system by using specially crafted path traversal sequences in requests directed to the web management service. The service is accessible without authentication and runs with elevated privileges, amplifying the impact of the vulnerability. An attacker can exploit this condition to access sensitive and privileged files on the system using path traversal payloads. Successful exploitation of this vulnerability could lead to the unauthorized disclosure of internal system information, compromising the confidentiality of the affected environment.
Title Directory Traversal in AMR Printer Management by AMR
First Time appeared Amr
Amr amr Printer Management Beta Web Service
Weaknesses CWE-22
CPEs cpe:2.3:a:amr:amr_printer_management_beta_web_service:1.01:*:*:*:*:*:*:*
Vendors & Products Amr
Amr amr Printer Management Beta Web Service
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2026-02-18T14:47:38.856Z

Reserved: 2026-02-13T12:10:06.897Z

Link: CVE-2026-2464

cve-icon Vulnrichment

Updated: 2026-02-18T14:47:30.515Z

cve-icon NVD

Status : Received

Published: 2026-02-18T14:16:07.120

Modified: 2026-02-18T14:16:07.120

Link: CVE-2026-2464

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.