CVE-2021-38154
HIGH EXPLOITED IN THE WILD NUCLEICanon devices <2020 - Info Disclosure
Title source: llmDescription
Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021.
Nuclei Templates (1)
Canon Devices - Authentication Bypass in Catwalk Server
HIGHVERIFIEDby daffainfo
Shodan:
title:"imageRUNNER"
Scores
CVSS v3
7.5
EPSS
0.0890
EPSS Percentile
92.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2021-08-29
InTheWild.io
2021-08-30
CWE
CWE-732
Status
published
Products (1)
canon/-
Published
Aug 29, 2021
Tracked Since
Feb 18, 2026