News Seven critical security vulnerabilities have been identified in current Canon i-Sensys printers

Status
Not open for further replies.
Users of recent Canon i-Sensys printers should be wary of having their printers online due to seven critical vulnerabilities, which can be accessed by unauthenticated remote attackers
Who opens a port-forward to their printer? This is further explained in the link in the excerpt I've quoted:

These vulnerabilities suggest the possibility that, if a product is connected directly to the Internet without using a router (wired or Wi-Fi), an unauthenticated remote attacker may be able to execute arbitrary code on the device. They may also be able to target the product in a Denial-of-Service (DoS) attack via the Internet.

Okay, so they have vulnerabilities to local attacks which is arguably more pressing and an excuse for the author to discuss the merits of true guest wifi networks for example, but for e-management, they are (like almost everything else remotely managed) designed to connect to a processing server from behind a firewall, they don't need to be accessible by the internet at large. Unless your methodology of choice is to give your printer it's own WAN IP or set it up as a DMZ, this is very much in the realms of theoretical, surely? Being Online as the article states in its opening paragraph isn't the problem - you could turn off all remote management and still have a LAN issue.
 
Status
Not open for further replies.