During the add printer process, a local attacker can overwrite CNMurGE.dll and, if timed properly, the overwritten DLL will be loaded into a SYSTEM process resulting in escalation of privileges. The Canon TR150 print driver through 3.71.2.10 is vulnerable to a privilege escalation issue. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021. For example, an incoming FAX may be sent through e-mail to the attacker. An attacker can remotely shut down the device after entering the background, creating a denial of service vulnerability.Ĭanon Oce Print Exec Workgroup 1.3.2 allows XSS via the lang parameter.Ĭanon Oce Print Exec Workgroup 1.3.2 allows Host header injection.Ĭertain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. In Canon LBP223 printers, the System Manager Mode login does not require an account password or PIN.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |