First published: Mon Jun 04 2018(Updated: )
** DISPUTED ** A remote attacker can bypass the System Manager Mode on the Canon MF210 and MF220 web interface without knowing the PIN for /login.html via vectors involving /portal_top.html to get full access to the device. NOTE: the vendor reportedly responded that this issue occurs when a customer keeps the default settings without using the countermeasures and best practices shown in the documentation.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canon Mf210 Firmware | ||
Canon MF210 | ||
Canon Mf220 Firmware | ||
Canon Mf220 | ||
All of | ||
Canon Mf210 Firmware | ||
Canon MF210 | ||
All of | ||
Canon Mf220 Firmware | ||
Canon Mf220 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-11711.
CVE-2018-11711 has a severity rating of 9.8 (critical).
The Canon MF210 and MF220 devices are affected by CVE-2018-11711.
A remote attacker can exploit CVE-2018-11711 by bypassing the System Manager Mode on the Canon MF210 and MF220 web interface without knowing the PIN for /login.html via vectors involving /portal_top.html to gain full access to the device.
Yes, there are known exploits available for CVE-2018-11711. Example exploits can be found at the following references: [GitHub Gist](https://gist.github.com/huykha/9dbcd0e46058f1e18bab241d1b2754bd) and [Exploit Database](https://www.exploit-db.com/exploits/44845/).