First published: Fri Jun 08 2018(Updated: )
** DISPUTED ** A remote attacker can bypass the System Manager Mode on the Canon LBP6030w web interface without a PIN for /checkLogin.cgi via vectors involving /portal_top.html to get full access to the device. NOTE: the vendor reportedly responded that this issue occurs when a customer keeps the default settings without using the countermeasures and best practices shown in the documentation.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canon Lbp6030w Firmware | ||
Canon LBP6030w | ||
All of | ||
Canon Lbp6030w Firmware | ||
Canon LBP6030w |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12049 is a vulnerability that allows a remote attacker to bypass the System Manager Mode on the Canon LBP6030w web interface without a PIN, gaining full access to the device.
The System Manager Mode can be bypassed on the Canon LBP6030w web interface without a PIN by exploiting vectors involving /portal_top.html and /checkLogin.cgi.
If an attacker gains full access to the Canon LBP6030w device, they can have complete control over it.
The vendor has not provided a fix for CVE-2018-12049.
CVE-2018-12049 has a severity rating of 9.8 (Critical).