3 results (0.002 seconds)

CVSS: 2.1EPSS: 0%CPEs: 9EXPL: 0

English/pages_MacUS/wls_set_content.html on the Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers shows the Wi-Fi PSK passphrase in cleartext, which allows physically proximate attackers to obtain sensitive information by reading the screen of an unattended workstation. English/pages_MacUS/wls_set_content.html en impresoras Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, y MX922 muestra la contraseña de paso (passphrase) en texto plano, lo que permite a atacantes físicamente próximos obtener información sensible mediante la lectura de la pantalla de una estación de trabajo. Various Canon printers suffer from a lack of password authentication, denial of service, and WEP/WPA/WPA2 secret disclosure vulnerabilities. Models affected include, but are not limited to, MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, and MX920. • http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0146.html http://www.mattandreko.com/2013/06/canon-y-u-no-security.html https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/canon_wireless.rb • CWE-255: Credentials Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

The default configuration of the administrative interface on the Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers does not require authentication, which allows remote attackers to modify the configuration by visiting the Advanced page. NOTE: the vendor has apparently responded by stating "for user convenience, the default setting does not require a password. However, if a user has a particular concern about third parties accessing the user's home printer, the default setting can be changed to add a password." La configuración por defecto de la interfaz de administración en las impresoras Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920 y MX922 no requiere autenticación, lo que permite a atacantes remotos modificar la configuración visitando la página de opciones avanzadas. NOTA: el vendedor al parecer ha respondido afirmando que "para mayor comodidad del usuario, la configuración por defecto no requiere una contraseña. • http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0146.html http://www.mattandreko.com/2013/06/canon-y-u-no-security.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 33%CPEs: 9EXPL: 0

The Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers allow remote attackers to cause a denial of service (device hang) via a crafted LAN_TXT24 parameter to English/pages_MacUS/cgi_lan.cgi followed by a direct request to English/pages_MacUS/lan_set_content.html. NOTE: the vendor has apparently responded by stating "Canon believes that its printers will not have to deal with unauthorized access to the network from an external location as long as the printers are used in a secured environment." Las impresoras Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920 y MX922 permite a atacantes remotos provocar una denegación de servicio (cuelgue del dispositivo) a través de un parámetro LAN_TXT24 especialmente diseñado a English/pages_MacUS/cgi_lan.cgi seguido de una petición directa a English/pages_MacUS/lan_set_content.html. NOTA: el vendedor ha respondido diciendo "Canon cree que sus impresoras no tendrán que hacer frente a accesos no autorizados a la red desde una ubicación externa, siempre y cuando las impresoras se utilizan en un entorno seguro." Various Canon printers suffer from a lack of password authentication, denial of service, and WEP/WPA/WPA2 secret disclosure vulnerabilities. • http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0146.html http://www.mattandreko.com/2013/06/canon-y-u-no-security.html https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/http/canon_wireless_printer.rb • CWE-20: Improper Input Validation •