First published: Fri Jun 08 2018(Updated: )
** DISPUTED ** A remote attacker can bypass the Management Mode on the Canon LBP7110Cw web interface without a PIN for /checkLogin.cgi via vectors involving /portal_top.html to get full access to the device. NOTE: the vendor reportedly responded that this issue occurs when a customer keeps the default settings without using the countermeasures and best practices shown in the documentation.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canon Lbp7110cw Firmware | ||
Canon LBP7110Cw | ||
All of | ||
Canon Lbp7110cw Firmware | ||
Canon LBP7110Cw |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2018-12048.
CVE-2018-12048 has a severity rating of 9.8 (Critical).
The affected software is Canon Lbp7110cw Firmware.
A remote attacker can exploit CVE-2018-12048 by bypassing the Management Mode on the Canon LBP7110Cw web interface without a PIN.
The vendor reportedly responded that this issue occurs when a customer keeps the default configuration, so it is recommended to change the default settings to mitigate the risk.