Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021.
References
Link | Resource |
---|---|
https://protocolpolice.nl/CVE-2021-38154_Protocol_Police_Catwalk_Alert | Exploit Third Party Advisory |
https://www.usa.canon.com/internet/portal/us/home/support/product-advisories | Product |
https://protocolpolice.nl/CVE-2021-38154_Protocol_Police_Catwalk_Alert | Exploit Third Party Advisory |
https://www.usa.canon.com/internet/portal/us/home/support/product-advisories | Product |
Configurations
History
21 Nov 2024, 06:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://protocolpolice.nl/CVE-2021-38154_Protocol_Police_Catwalk_Alert - Exploit, Third Party Advisory | |
References | () https://www.usa.canon.com/internet/portal/us/home/support/product-advisories - Product |
Information
Published : 2021-08-29 05:15
Updated : 2024-11-21 06:16
NVD link : CVE-2021-38154
Mitre link : CVE-2021-38154
CVE.ORG link : CVE-2021-38154
JSON object : View
Products Affected
canon
- -
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource