A passback vulnerability has been found in some Canon printers, including production and multifunction models. If an attacker gains administrative access, they could obtain sensitive authentication information, including SMTP and LDAP connections.
Affected Products:
By infosecbulletin
/ Friday , May 23 2025
A passback vulnerability has been found in some Canon printers, including production and multifunction models. If an attacker gains administrative...
Read More
By infosecbulletin
/ Friday , May 23 2025
Security researchers have discovered a database with 184 million account credentials, highlighting the need to update compromised passwords, strengthen weak...
Read More
By infosecbulletin
/ Wednesday , May 21 2025
Palo Alto Networks warns a reflected cross-site scripting (XSS) vulnerability, CVE-2025-0133, in the GlobalProtect gateway and portal features of its...
Read More
By infosecbulletin
/ Wednesday , May 21 2025
Pwn2Own Berlin 2025, a top cybersecurity contest, awarded $1,078,750 to researchers who discovered 29 zero-day vulnerabilities in various enterprise technologies....
Read More
By infosecbulletin
/ Wednesday , May 21 2025
A recently discovered vulnerability, CVE-2025-22157, threatens organizations using Atlassian’s Jira Core Data Center and Jira Service Management Data Center by...
Read More
By infosecbulletin
/ Tuesday , May 20 2025
A nationwide phone network has gone down in Spain, shortly after blackouts caused chaos and significant financial losses. Emergency services...
Read More
By infosecbulletin
/ Monday , May 19 2025
Billions of files, including documents, source code, and backups, are leaking because of misconfigured cloud storage. Cyble, a cybersecurity company...
Read More
By infosecbulletin
/ Sunday , May 18 2025
Cyber fraudsters hacked the Himachal Pradesh State Cooperative Bank's server using a customer's mobile phone. According to reports, the fraudsters...
Read More
By infosecbulletin
/ Sunday , May 18 2025
"InfoSecCon-2025" was successfully held with tremendous audiences with various time demanding topics and keynotes at Dhaka on 16 May- 2025....
Read More
By infosecbulletin
/ Saturday , May 17 2025
A new class of vulnerabilities in Intel processors, called Branch Predictor Race Conditions (BPRC), enables attackers to extract sensitive data...
Read More
imageRUNNER ADVANCE Series
imageRUNNER Series
imagePRESS V Series
imagePRESS Series
imageCLASS Series
i-sensys Series
Satera Series
Mitigation/Remediation:
To ensure the security of our customers’ print infrastructure, Canon recommends following these guidelines:
- Avoid connecting products directly to public internet networks. Instead, when connecting to the internet, use a private IP address in an environment where the internet can be accessed from a secure private network, built with firewall products, wired routers or Wi-Fi routers.
- Change the product’s default password to a new password.
- Set up administrator and general user IDs and passwords.
- Ensure that passwords and other similar settings for various functions are sufficiently difficult to guess.
- If the product has single or multi-factor authentication functions, use them to confirm the identity of the end-user who is using the product.
- Be aware of physical security needs, including those related to the location of the product etc.
Canon advises to see here for more information on securing products when For enhanced security, some products have special features. More details are available on local Canon websites.
Palo Alto Networks Warns of XSS Flaw: PoC Released