08-24-2018 10:40 AM - edited 08-24-2018 10:44 AM
I'm curious to know what Canon's position is on the vulnerability dubbed "Faxsploit" recently discovered by CheckPoint researchers (CVE-2018-5924 and CVE-2018-5925). These critical vulnerabilities have a CVSS v3 score of 9.8 out of 10. Specifically, I would like to know if Canon has verified that their line of MFP's are not vulnerable and do not use the color fax T.30 extension. While currently only HP MFP devices are known to be vulnerable, the researchers said that other fax vendors are most likely affected by similar vulnerabilities.
To directly quote CheckPoint: "Our research was done on HP Officejet all-in-one printers though this was merely a test-case. We strongly believe that similar vulnerabilities apply to other fax vendors too as this research concerns the fax communication protocols in general."
Other Fax Vendors have issued statements about the impact of this vulnerability on their devices/fax software:
Demo of Exploit: https://youtu.be/1VDZTjngNqs
Solved! Go to Solution.
08-30-2018 02:47 PM - edited 08-30-2018 02:50 PM
Our engineers and IT teams have researched this and have issued the following statement which you can find on the Canon Global web site:
Recently, researchers reported on vulnerabilities found in the communication protocols in the fax functions of certain products. (CVE-ID: CVE-2018-5924, CVE 2018-5925)
For information regarding the impact of these vulnerabilities on Canon products equipped with fax functions, please see below:
Based on our review, as they do not employ the color G3 Fax Protocol exploited by these vulnerabilities, the following products are unaffected:
imageRUNNER/iR, imageRUNNER ADVANCE, LASER CLASS, imagePRESS, FAXPHONE, GP and imageCLASS/i-SENSYS series models equipped with fax functions.
MAXIFY and PIXMA series products equipped with fax functions do make use of the color G3 Fax Protocol. However, we have not identified any risk of malicious code being executed via the fax circuit or risk to the security of information saved on these devices.
We will continue to monitor this situation and take appropriate action necessary to help ensure the security of our devices.