Home » Canon Printer has 7 serious vulnerabilities that can be remotely controlled by hackers and used as DDoS attacks – Computer Field HKEPC Hardware

Canon Printer has 7 serious vulnerabilities that can be remotely controlled by hackers and used as DDoS attacks – Computer Field HKEPC Hardware

by admin
Canon Printer has 7 serious vulnerabilities that can be remotely controlled by hackers and used as DDoS attacks – Computer Field HKEPC Hardware

Canon Printer has 7 serious vulnerabilities

Remotely controlled by hackers and used for DDoS attacks

[9.8/10ExtremelyHighRisk⚠️]Your Printer may have been controlled by hackers and is undergoing a DDoS attack!! Canon admitted on the 7th that there are 7 serious security vulnerabilities in some models of its i-Sensys series Printers, and the CVSS vulnerability score is as high as 9.8/ 10. Allows hackers to remotely invade and execute arbitrary code, force the device to crash, and launch denial of service attacks.

According to Canon’s notification, affected Printer models include Canon i-Sensys MF750 and LBP670 color laser series, as well as i-Sensys X series C1333i, C1333iF, and X C1333P. All versions of Firmware version 3.07 or below are affected. Vulnerability identification code For CVE-2023-6229, CVE-2023-6230, CVE-2023-6231, CVE-2023-6232, CVE-2023-6233, CVE-2023-6234 and CVE-2024-0244

Canon warns that affected printers are considered vulnerable to attacks that could allow hackers to remotely execute arbitrary code, force the device to crash, and launch denial-of-service attacks. Most vulnerabilities are also marked as “very high risk” according to the Common Vulnerability Scoring System (CVSS), with a severity rating of 9.8/10.

If you are using the above-mentioned Canon Printer, the official update firmware has been released, please download and patch the vulnerability as soon as possible.

See also  Oracle MySQL: IT vulnerability with high risk! Multiple vulnerabilities reported

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy