Security Bulletin
This security bulletin contains information about 11 vulnerabilities.
EUVDB-ID: #VU76467
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0851
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
External linkshttp://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76468
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0854
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
External linkshttp://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76469
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0852
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
External linkshttp://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76470
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0853
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
External linkshttp://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76471
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0855
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
External linkshttp://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76472
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0856
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
External linkshttp://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76473
Risk: High
CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-43974
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
External linkshttp://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76475
Risk: Medium
CVSSv3.1: 7.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-43608
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow. A remote attacker on the local network can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
External linkshttp://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76476
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0857
CWE-ID:
CWE-286 - Incorrect User Management
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to incorrect user management. A remote attacker can change the product's settings or gain unauthorized access to the product.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
External linkshttp://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76478
Risk: Low
CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0858
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the product.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
External linkshttp://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76480
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0859
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input. A remote administrator can pass specially crafted input to the application and install an arbitrary file on the product.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
External linkshttp://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.