Arbitrary Code Execution Vulnerability in Canon ImageCLASS Printers
CVE-2022-24674
8.8HIGH
What is CVE-2022-24674?
This vulnerability affects the Canon imageCLASS MF644Cdw printer model, allowing network-adjacent attackers to execute arbitrary code without requiring any form of authentication. The vulnerability is found within the privet API, which lacks proper validation of user-supplied data lengths. This flaw enables malicious actors to exploit the fixed-length stack-based buffer, executing code with root privileges, thereby compromising the device and potentially affecting the network it operates on. For more information, refer to the advisory by the Zero Day Initiative and Canon's official support page.
Affected Version(s)
imageCLASS MF644Cdw 10.02
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
CVSS V3.0
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Nicolas Devillers ( @nikaiw ), Jean-Romain Garnier and Raphael Rigo ( @_trou_ )