Search criteria
4 vulnerabilities found for imageRUNNER by Canon
VAR-202203-1326
Vulnerability from variot - Updated: 2024-11-23 22:36The Rambus SafeZone Basic Crypto Module before 10.4.0, as used in certain Fujifilm (formerly Fuji Xerox) devices before 2022-03-01, Canon imagePROGRAF and imageRUNNER devices through 2022-03-14, and potentially many other devices, generates RSA keys that can be broken with Fermat's factorization method. This allows efficient calculation of private RSA keys from the public key of a TLS certificate. Rambus FIPS is a portable software encryption toolkit from Rambus that allows IoT device and platform manufacturers to deploy the security they need
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202203-1326",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "apeosport 3560",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport-vii c4473",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "docucentre-vii c3372",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "apeos c4570",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.7"
},
{
"model": "apeosport c3060",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport c3570 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeos c328 df",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "202112062053"
},
{
"model": "apeosport 3060",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport-vii c2273",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "safezone basic crypto module",
"scope": "lt",
"trust": 1.0,
"vendor": "rambus",
"version": "10.4.0"
},
{
"model": "apeosport-vii c7788",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.1"
},
{
"model": "apeosport-vii c7773",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "docuprint 3508 d",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.57.5"
},
{
"model": "apeosport 3560 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport-vii cp4421",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "docucentre-vii c7773",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "apeos c6570 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.7"
},
{
"model": "apeospro c810",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.6"
},
{
"model": "apeosport 4570 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosprint c325 dw",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "202112062117"
},
{
"model": "apeos c4570 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.7"
},
{
"model": "apeosport-vii c5573",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "apeosport 3060 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport-vii p4021",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport c5570",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport-vii c3372",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "apeosport 2560",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeos c325 dw",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "202112062053"
},
{
"model": "apeosport c6570",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport print c5570",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "docuprint 3205 d",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.57.5"
},
{
"model": "docucentre-vii c5588",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.1"
},
{
"model": "apeos c7070",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.7"
},
{
"model": "apeosport c2560",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport-vii c4421",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeos c328 dw",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "202112062053"
},
{
"model": "apeosport-vii c6688",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.1"
},
{
"model": "docuprint 3208 d",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.57.5"
},
{
"model": "apeosport c4570",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport 4570",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport c5570 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport-vii c6773",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "apeosport c2560 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeos c3070",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.7"
},
{
"model": "apeos c3070 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.7"
},
{
"model": "apeosport-vii 4021",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport c7070 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "docucentre-vii c6673",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "apeosport c7070",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport c4570 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "docuprint c3555 d",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.57.6"
},
{
"model": "apeosport-vii 5021",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport 5570",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport c3070",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport c6570 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeos c325 z",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "202112062053"
},
{
"model": "apeosport 5570 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosprint c328 dw",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "202112062117"
},
{
"model": "apeosprint c328",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "202112062117"
},
{
"model": "primelink c9065",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.145.1"
},
{
"model": "apeosport c2060 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeosport-vii c5588",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.1"
},
{
"model": "apeosport c2060",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "primelink c9070",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.145.1"
},
{
"model": "apeosport-vii c3321",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeospro c750",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.6"
},
{
"model": "apeosport-vii c3373",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "apeospro c650",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.6"
},
{
"model": "apeosport c3070 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "docuprint c2555 d",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.57.6"
},
{
"model": "docucentre-vii c2273",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "docucentre-vii c3373",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "imagerunner",
"scope": "lte",
"trust": 1.0,
"vendor": "canon",
"version": "2020-03-14"
},
{
"model": "apeos c5570",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.7"
},
{
"model": "apeos c8180",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.6"
},
{
"model": "docuprint 4405 d",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.57.5"
},
{
"model": "docuprint 4408 d",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.57.5"
},
{
"model": "docucentre-vii c7788",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.1"
},
{
"model": "apeos c7070 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.7"
},
{
"model": "imageprograf",
"scope": "lt",
"trust": 1.0,
"vendor": "canon",
"version": "2020-03-14"
},
{
"model": "safezone basic crypto module",
"scope": "gte",
"trust": 1.0,
"vendor": "rambus",
"version": "9.3.0"
},
{
"model": "apeos c5570 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.7"
},
{
"model": "apeos c7580",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.6"
},
{
"model": "docucentre-vii c5573",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "docucentre-vii c6688",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.1"
},
{
"model": "apeosport 2560 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "docuprint 3505 d",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.57.5"
},
{
"model": "apeosport c3570",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.9"
},
{
"model": "apeos c6580",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.6"
},
{
"model": "apeos c6570",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.7"
},
{
"model": "docucentre-vii c4473",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.60.2"
},
{
"model": "apeos c3570",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.7"
},
{
"model": "apeos c3570 g",
"scope": "lt",
"trust": 1.0,
"vendor": "fujifilm",
"version": "1.1.7"
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2022-26320"
}
]
},
"cve": "CVE-2022-26320",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2022-26320",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.1,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-415478",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2022-26320",
"impactScore": 5.2,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-26320",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "CNNVD",
"id": "CNNVD-202203-1379",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-415478",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2022-26320",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-415478"
},
{
"db": "VULMON",
"id": "CVE-2022-26320"
},
{
"db": "CNNVD",
"id": "CNNVD-202203-1379"
},
{
"db": "NVD",
"id": "CVE-2022-26320"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Rambus SafeZone Basic Crypto Module before 10.4.0, as used in certain Fujifilm (formerly Fuji Xerox) devices before 2022-03-01, Canon imagePROGRAF and imageRUNNER devices through 2022-03-14, and potentially many other devices, generates RSA keys that can be broken with Fermat\u0027s factorization method. This allows efficient calculation of private RSA keys from the public key of a TLS certificate. Rambus FIPS is a portable software encryption toolkit from Rambus that allows IoT device and platform manufacturers to deploy the security they need",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-26320"
},
{
"db": "CNNVD",
"id": "CNNVD-202203-1379"
},
{
"db": "VULHUB",
"id": "VHN-415478"
},
{
"db": "VULMON",
"id": "CVE-2022-26320"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-26320",
"trust": 1.8
},
{
"db": "CNNVD",
"id": "CNNVD-202203-1379",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-415478",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2022-26320",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-415478"
},
{
"db": "VULMON",
"id": "CVE-2022-26320"
},
{
"db": "CNNVD",
"id": "CNNVD-202203-1379"
},
{
"db": "NVD",
"id": "CVE-2022-26320"
}
]
},
"id": "VAR-202203-1326",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-415478"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-23T22:36:52.390000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "",
"trust": 0.1,
"url": "https://github.com/google/paranoid_crypto "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-26320"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-330",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-415478"
},
{
"db": "NVD",
"id": "CVE-2022-26320"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://www.fujifilm.com/fbglobal/eng/company/news/notice/2022/0302_rsakey_announce.html"
},
{
"trust": 1.8,
"url": "https://fermatattack.secvuln.info"
},
{
"trust": 1.8,
"url": "https://global.canon/en/support/security/index.html"
},
{
"trust": 1.8,
"url": "https://safezoneswupdate.com"
},
{
"trust": 1.0,
"url": "https://www.rambus.com/security/response-center/advisories/rmbs-2021-01/"
},
{
"trust": 1.0,
"url": "https://web.archive.org/web/20220922042721/https://safezoneswupdate.com/"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-26320/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/330.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://github.com/google/paranoid_crypto"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-415478"
},
{
"db": "VULMON",
"id": "CVE-2022-26320"
},
{
"db": "CNNVD",
"id": "CNNVD-202203-1379"
},
{
"db": "NVD",
"id": "CVE-2022-26320"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-415478"
},
{
"db": "VULMON",
"id": "CVE-2022-26320"
},
{
"db": "CNNVD",
"id": "CNNVD-202203-1379"
},
{
"db": "NVD",
"id": "CVE-2022-26320"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-03-14T00:00:00",
"db": "VULHUB",
"id": "VHN-415478"
},
{
"date": "2022-03-14T00:00:00",
"db": "VULMON",
"id": "CVE-2022-26320"
},
{
"date": "2022-03-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202203-1379"
},
{
"date": "2022-03-14T18:15:08.123000",
"db": "NVD",
"id": "CVE-2022-26320"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-03-23T00:00:00",
"db": "VULHUB",
"id": "VHN-415478"
},
{
"date": "2022-03-23T00:00:00",
"db": "VULMON",
"id": "CVE-2022-26320"
},
{
"date": "2022-03-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202203-1379"
},
{
"date": "2024-11-21T06:53:44.970000",
"db": "NVD",
"id": "CVE-2022-26320"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202203-1379"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rambus FIPS Security feature vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202203-1379"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "security feature problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202203-1379"
}
],
"trust": 0.6
}
}
JVNDB-2008-000013
Vulnerability from jvndb - Published: 2008-05-21 00:00 - Updated:2008-05-21 11:31Summary
FTP bounce vulnerability in multiple Canon digital multifunction copiers and laser beam printers
Details
Multiple Canon digital multifunction copiers and laser beam printers contain a vulnerability that could allow a remote attacker to access other network devices via a built-in FTP server.
The Canon Color imageRUNNER Series, imageRUNNER Series, imagePRESS Series, and laser beam printer series are digital multifunction copiers and printers. Some of these products contain a vulnerability that could allow a remote attacker to access other network devices via a built-in FTP server.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000013.html",
"dc:date": "2008-05-21T11:31+09:00",
"dcterms:issued": "2008-05-21T00:00+09:00",
"dcterms:modified": "2008-05-21T11:31+09:00",
"description": "Multiple Canon digital multifunction copiers and laser beam printers contain a vulnerability that could allow a remote attacker to access other network devices via a built-in FTP server.\r\n\r\nThe Canon Color imageRUNNER Series, imageRUNNER Series, imagePRESS Series, and laser beam printer series are digital multifunction copiers and printers. Some of these products contain a vulnerability that could allow a remote attacker to access other network devices via a built-in FTP server.",
"link": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000013.html",
"sec:cpe": {
"#text": "cpe:/a:canon:imagerunner",
"@product": "imageRUNNER",
"@vendor": "Canon",
"@version": "2.2"
},
"sec:cvss": {
"@score": "5.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2008-000013",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN10056705/index.html",
"@id": "JVN#10056705",
"@source": "JVN"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0303",
"@id": "CVE-2008-0303",
"@source": "CVE"
},
{
"#text": "http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0303",
"@id": "CVE-2008-0303",
"@source": "NVD"
},
{
"#text": "http://www.kb.cert.org/vuls/id/568073",
"@id": "VU#568073",
"@source": "CERT-VN"
},
{
"#text": "http://www.securityfocus.com/bid/28042",
"@id": "28042",
"@source": "BID"
},
{
"#text": "http://securitytracker.com/id?1019528",
"@id": "1019528",
"@source": "SECTRACK"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-DesignError",
"@title": "No Mapping(CWE-DesignError)"
}
],
"title": "FTP bounce vulnerability in multiple Canon digital multifunction copiers and laser beam printers"
}
CVE-2008-0303 (GCVE-0-2008-0303)
Vulnerability from nvd – Published: 2008-02-29 02:00 – Updated: 2024-08-07 07:39
VLAI?
Summary
The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:39:34.226Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#568073",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/568073"
},
{
"name": "28042",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28042"
},
{
"name": "JVN#10056705",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN10056705/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
},
{
"name": "1019528",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1019528"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
},
{
"name": "JVNDB-2008-000013",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-02-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-03-13T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "VU#568073",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/568073"
},
{
"name": "28042",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28042"
},
{
"name": "JVN#10056705",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN10056705/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
},
{
"name": "1019528",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1019528"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
},
{
"name": "JVNDB-2008-000013",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-0303",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#568073",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/568073"
},
{
"name": "28042",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28042"
},
{
"name": "JVN#10056705",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN10056705/index.html"
},
{
"name": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack",
"refsource": "MISC",
"url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
},
{
"name": "1019528",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019528"
},
{
"name": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf",
"refsource": "CONFIRM",
"url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
},
{
"name": "JVNDB-2008-000013",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-0303",
"datePublished": "2008-02-29T02:00:00",
"dateReserved": "2008-01-16T00:00:00",
"dateUpdated": "2024-08-07T07:39:34.226Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-0303 (GCVE-0-2008-0303)
Vulnerability from cvelistv5 – Published: 2008-02-29 02:00 – Updated: 2024-08-07 07:39
VLAI?
Summary
The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:39:34.226Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#568073",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/568073"
},
{
"name": "28042",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28042"
},
{
"name": "JVN#10056705",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN10056705/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
},
{
"name": "1019528",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1019528"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
},
{
"name": "JVNDB-2008-000013",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-02-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-03-13T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "VU#568073",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/568073"
},
{
"name": "28042",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28042"
},
{
"name": "JVN#10056705",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN10056705/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
},
{
"name": "1019528",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1019528"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
},
{
"name": "JVNDB-2008-000013",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-0303",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#568073",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/568073"
},
{
"name": "28042",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28042"
},
{
"name": "JVN#10056705",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN10056705/index.html"
},
{
"name": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack",
"refsource": "MISC",
"url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
},
{
"name": "1019528",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019528"
},
{
"name": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf",
"refsource": "CONFIRM",
"url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
},
{
"name": "JVNDB-2008-000013",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-0303",
"datePublished": "2008-02-29T02:00:00",
"dateReserved": "2008-01-16T00:00:00",
"dateUpdated": "2024-08-07T07:39:34.226Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}