Directory Traversal in AMR Printer Management by AMR
AMR Printer Management 1.01 Beta web service.
INCIBE has coordinated the publication of a high-severity vulnerability affecting AMR Printer Management by AMR, software company that provides solutions for the management and control of printing equipment. The vulnerability was discovered by Daniel Damota Maldonado of Soporttec Servicios Informaticos Integrados Para Empresas SL..
This vulnerability has been assigned the following code, CVSS v4.0 base score, CVSS vector and CWE vulnerability type:
- CVE-2026-2464: CVSS v4.0: 8.7 | CVSS AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N | CWE-22
The manufacturer claims to have fixed the vulnerability.
CVE-2026-2464: Path traversal vulnerability in the AMR Printer Management 1.01 Beta web service, which allows remote attackers to read arbitrary files from the underlying Windows system by using specially crafted path traversal sequences in requests directed to the web management service.
The service is accessible without authentication and runs with elevated privileges, amplifying the impact of the vulnerability. An attacker can exploit this condition to access sensitive and privileged files on the system using path traversal payloads.
Successful exploitation of this vulnerability could lead to the unauthorized disclosure of internal system information, compromising the confidentiality of the affected environment.
| Identificador CVE | Severidad | Explotación | Fabricante |
|---|---|---|---|
| CVE-2026-2464 | Alta | No | AMR Printer Management Software |



