Summary
This host is running Canon Printer and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to cause the denial of service and obtain the sensitive information.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
- Printers do not require a password for the administrative interfaces by default. Unauthorized users on the network may configure the printer.
- Administrative interface on these printers allow a user to enter a WEP/WPA/WPA2 pre-shared key. Once a key is entered, when a user browses the configuration page again, they can view the current password in clear-text.
- Administrative interface on the devices, Using specially crafted HTTP requests, it is possible to cause the device to no longer respond.
Affected
Canon Printers
References
Severity
Classification
-
CVE CVE-2013-4613, CVE-2013-4614, CVE-2013-4615 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities