<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Faxsploit - T.30 extension vulnerability in General Discussion</title>
    <link>https://community.usa.canon.com/t5/General-Discussion/Faxsploit-T-30-extension-vulnerability/m-p/253994#M25133</link>
    <description>&lt;P&gt;Hi, tbec2018!&lt;/P&gt;&lt;P&gt;Our engineers and IT teams have researched this and have issued the following statement which you can find on the &lt;A href="https://global.canon/en/support/security/fax.html#xA;" target="_blank"&gt;Canon Global web site&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#808080"&gt;Recently, researchers reported on vulnerabilities found in the communication protocols in the fax functions of certain products. (CVE-ID: CVE-2018-5924, CVE 2018-5925)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#808080"&gt;For information regarding the impact of these vulnerabilities on Canon products equipped with fax functions, please see below:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#808080"&gt;Based on our review, as they do not employ the color G3 Fax Protocol exploited by these vulnerabilities, the following products are unaffected:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#808080"&gt;imageRUNNER/iR, imageRUNNER ADVANCE, LASER CLASS, imagePRESS, FAXPHONE, GP and imageCLASS/i-SENSYS series models equipped with fax functions.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#808080"&gt;MAXIFY and PIXMA series products equipped with fax functions do make use of the color G3 Fax Protocol. However, we have not identified any risk of malicious code being executed via the fax circuit or risk to the security of information saved on these devices.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#808080"&gt;We will continue to monitor this situation and take appropriate action necessary to help ensure the security of our devices.&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 30 Aug 2018 18:50:16 GMT</pubDate>
    <dc:creator>Danny</dc:creator>
    <dc:date>2018-08-30T18:50:16Z</dc:date>
    <item>
      <title>Faxsploit - T.30 extension vulnerability</title>
      <link>https://community.usa.canon.com/t5/General-Discussion/Faxsploit-T-30-extension-vulnerability/m-p/253374#M25132</link>
      <description>&lt;P&gt;I'm curious to know what Canon's position is on the vulnerability dubbed "Faxsploit" recently discovered by CheckPoint researchers (CVE-2018-5924 and CVE-2018-5925).&amp;nbsp; These critical vulnerabilities have a CVSS v3 score of 9.8 out of 10.&amp;nbsp; Specifically, I would like to know if Canon has verified that their line of MFP's are not vulnerable and do not use the&amp;nbsp;color fax T.30 extension.&amp;nbsp; While currently only HP MFP devices are known to be vulnerable, the researchers said&amp;nbsp;that other fax vendors are most likely affected by similar vulnerabilities.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To directly quote CheckPoint: "Our research was done on HP Officejet all-in-one printers though this was merely a test-case. We strongly believe that similar vulnerabilities apply to other fax vendors too as this research concerns the fax communication protocols in general."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/" target="_self"&gt;https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other Fax Vendors have issued statements about the impact of this vulnerability on their devices/fax software:&lt;/P&gt;&lt;P&gt;Ex:&amp;nbsp;&lt;A href="https://www.biscom.com/faxsploit-recent-mfp-fax-vulnerability/" target="_self"&gt;https://www.biscom.com/faxsploit-recent-mfp-fax-vulnerability/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Demo of Exploit:&amp;nbsp;&lt;A href="https://youtu.be/1VDZTjngNqs" target="_self"&gt;https://youtu.be/1VDZTjngNqs&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Aug 2018 14:44:21 GMT</pubDate>
      <guid>https://community.usa.canon.com/t5/General-Discussion/Faxsploit-T-30-extension-vulnerability/m-p/253374#M25132</guid>
      <dc:creator>tbec2018</dc:creator>
      <dc:date>2018-08-24T14:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: Faxsploit - T.30 extension vulnerability</title>
      <link>https://community.usa.canon.com/t5/General-Discussion/Faxsploit-T-30-extension-vulnerability/m-p/253994#M25133</link>
      <description>&lt;P&gt;Hi, tbec2018!&lt;/P&gt;&lt;P&gt;Our engineers and IT teams have researched this and have issued the following statement which you can find on the &lt;A href="https://global.canon/en/support/security/fax.html#xA;" target="_blank"&gt;Canon Global web site&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#808080"&gt;Recently, researchers reported on vulnerabilities found in the communication protocols in the fax functions of certain products. (CVE-ID: CVE-2018-5924, CVE 2018-5925)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#808080"&gt;For information regarding the impact of these vulnerabilities on Canon products equipped with fax functions, please see below:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#808080"&gt;Based on our review, as they do not employ the color G3 Fax Protocol exploited by these vulnerabilities, the following products are unaffected:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#808080"&gt;imageRUNNER/iR, imageRUNNER ADVANCE, LASER CLASS, imagePRESS, FAXPHONE, GP and imageCLASS/i-SENSYS series models equipped with fax functions.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#808080"&gt;MAXIFY and PIXMA series products equipped with fax functions do make use of the color G3 Fax Protocol. However, we have not identified any risk of malicious code being executed via the fax circuit or risk to the security of information saved on these devices.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#808080"&gt;We will continue to monitor this situation and take appropriate action necessary to help ensure the security of our devices.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 18:50:16 GMT</pubDate>
      <guid>https://community.usa.canon.com/t5/General-Discussion/Faxsploit-T-30-extension-vulnerability/m-p/253994#M25133</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-08-30T18:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: Faxsploit - T.30 extension vulnerability</title>
      <link>https://community.usa.canon.com/t5/General-Discussion/Faxsploit-T-30-extension-vulnerability/m-p/253998#M25134</link>
      <description>&lt;P&gt;Thank you for the follow-up - it's greatly appreciated!&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 20:57:04 GMT</pubDate>
      <guid>https://community.usa.canon.com/t5/General-Discussion/Faxsploit-T-30-extension-vulnerability/m-p/253998#M25134</guid>
      <dc:creator>tbec2018</dc:creator>
      <dc:date>2018-08-30T20:57:04Z</dc:date>
    </item>
  </channel>
</rss>

