Risk | High |
Patch available | YES |
Number of vulnerabilities | 11 |
CVE-ID | CVE-2023-0851 CVE-2023-0854 CVE-2023-0852 CVE-2023-0853 CVE-2023-0855 CVE-2023-0856 CVE-2022-43974 CVE-2022-43608 CVE-2023-0857 CVE-2023-0858 CVE-2023-0859 |
CWE-ID | CWE-122 CWE-121 CWE-190 CWE-286 CWE-284 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
imageCLASS MF1127C Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF262DW II Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF264DW II Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF267DW II Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF269DW II Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF269DW VP II Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF272DW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF273DW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF275DW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF641CW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF642CDW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF644CDW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF741CDW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF743CDW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF745CDW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS MF746CDW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS LBP122DW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS LBP1127C Hardware solutions / Office equipment, IP-phones, print servers imageCLASS LBP622CDW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS LBP623CDW Hardware solutions / Office equipment, IP-phones, print servers imageCLASS LBP664CDW Hardware solutions / Office equipment, IP-phones, print servers imagePROGRAF TC-20 Hardware solutions / Office equipment, IP-phones, print servers imagePROGRAF TC-20M Hardware solutions / Office equipment, IP-phones, print servers PIXMA G3270 Hardware solutions / Office equipment, IP-phones, print servers PIXMA G4270 Hardware solutions / Office equipment, IP-phones, print servers MAXIFY GX3020 Hardware solutions / Office equipment, IP-phones, print servers MAXIFY GX4020 Hardware solutions / Office equipment, IP-phones, print servers |
Vendor | Canon U.S.A. |
Security Bulletin
This security bulletin contains information about 11 vulnerabilities.
EUVDB-ID: #VU76467
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0851
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
CPE2.3http://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76468
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0854
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
CPE2.3http://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76469
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0852
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
CPE2.3http://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76470
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0853
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
CPE2.3http://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76471
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0855
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
CPE2.3http://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76472
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0856
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
CPE2.3http://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76473
Risk: High
CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-43974
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
CPE2.3http://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76475
Risk: Medium
CVSSv3.1: 7.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-43608
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow. A remote attacker on the local network can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
CPE2.3http://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76476
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0857
CWE-ID:
CWE-286 - Incorrect User Management
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to incorrect user management. A remote attacker can change the product's settings or gain unauthorized access to the product.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
CPE2.3http://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76478
Risk: Low
CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0858
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the product.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
CPE2.3http://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76480
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-0859
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input. A remote administrator can pass specially crafted input to the application and install an arbitrary file on the product.
MitigationInstall updates from vendor's website.
Vulnerable software versionsimageCLASS MF1127C: All versions
imageCLASS MF262DW II: All versions
imageCLASS MF264DW II: All versions
imageCLASS MF267DW II: All versions
imageCLASS MF269DW II: All versions
imageCLASS MF269DW VP II: All versions
imageCLASS MF272DW: All versions
imageCLASS MF273DW: All versions
imageCLASS MF275DW: All versions
imageCLASS MF641CW: All versions
imageCLASS MF642CDW: All versions
imageCLASS MF644CDW: All versions
imageCLASS MF741CDW: All versions
imageCLASS MF743CDW: All versions
imageCLASS MF745CDW: All versions
imageCLASS MF746CDW: All versions
imageCLASS LBP122DW: All versions
imageCLASS LBP1127C: All versions
imageCLASS LBP622CDW: All versions
imageCLASS LBP623CDW: All versions
imageCLASS LBP664CDW: All versions
imagePROGRAF TC-20: All versions
imagePROGRAF TC-20M: All versions
PIXMA G3270: All versions
PIXMA G4270: All versions
MAXIFY GX3020: All versions
MAXIFY GX4020: All versions
CPE2.3http://jvn.jp/en/vu/JVNVU94777298/index.html
http://psirt.canon/advisory-information/cp2023-001/
http://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediatio...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.