CVE-2021-38154

HIGH EXPLOITED IN THE WILD NUCLEI

Canon devices <2020 - Info Disclosure

Title source: llm

Description

Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021.

Nuclei Templates (1)

Canon Devices - Authentication Bypass in Catwalk Server
HIGHVERIFIEDby daffainfo
Shodan: title:"imageRUNNER"

Scores

CVSS v3 7.5
EPSS 0.0890
EPSS Percentile 92.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2021-08-29
InTheWild.io 2021-08-30
CWE
CWE-732
Status published
Products (1)
canon/-
Published Aug 29, 2021
Tracked Since Feb 18, 2026