First published: Fri Jun 21 2013(Updated: )
English/pages_MacUS/wls_set_content.html on the Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers shows the Wi-Fi PSK passphrase in cleartext, which allows physically proximate attackers to obtain sensitive information by reading the screen of an unattended workstation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canon MG3100 Printer | ||
Canon MG5300 Printer | ||
Canon MG6100 Series Printer | ||
Canon MP340 Printer | ||
Canon MP495 Printer | ||
Canon MX870 Printer | ||
Canon MX890 Printer | ||
Canon MX920 Printer | ||
Canon MX922 Printer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4614 has a medium severity level as it exposes sensitive information to physically proximate attackers.
To mitigate CVE-2013-4614, ensure that the printer screen is attended to or consider disabling the display of Wi-Fi PSK passphrases.
CVE-2013-4614 affects several Canon printer models, including MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922.
CVE-2013-4614 exposes the Wi-Fi PSK passphrase in cleartext, allowing attackers to retrieve sensitive information.
Yes, physical access to the affected printers is required to exploit CVE-2013-4614 and view the sensitive information displayed.