Vulnerability Description
Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canon | - | All versions |
Related Weaknesses (CWE)
References
- https://protocolpolice.nl/CVE-2021-38154_Protocol_Police_Catwalk_AlertExploitThird Party Advisory
- https://www.usa.canon.com/internet/portal/us/home/support/product-advisoriesProduct
- https://protocolpolice.nl/CVE-2021-38154_Protocol_Police_Catwalk_AlertExploitThird Party Advisory
- https://www.usa.canon.com/internet/portal/us/home/support/product-advisoriesProduct
FAQ
What is CVE-2021-38154?
CVE-2021-38154 is a vulnerability with a CVSS score of 7.5 (HIGH). Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address s...
How severe is CVE-2021-38154?
CVE-2021-38154 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-38154?
Check the references section above for vendor advisories and patch information. Affected products include: Canon -.