Image representing protecting your business for cyber attacks with CyberGuard

Product Security

On this page you will find important information regarding Canon security

News

  • A potential issue of the uniqueness of an ID card has been identified in the card readers rebranded by NT-ware (originally developed and provided by rf IDEAS) and published CVE-2024-1578.

    Whilst we have not received any reports of exploitation, we recommend that you read the security advisory link.

    Details of the vulnerability, mitigation and remediation can be found at:

    Security Advisory: Multiple MiCard PLUS card reader dropped characters

  • A potential susceptibility to compromise in device registration has been identified in uniFLOW Online and published CVE-2024-1621.

    Whilst we have not received any reports of exploitation, we recommend that you read the security advisory link.

    Details of the vulnerability, mitigation and remediation can be found at:

    Security Advisory: Device registration susceptible to compromise

  • A buffer overflow vulnerability in the WSD protocol process was found for certain Small Office Multifunction Printers and Laser Printers.

    Details of the vulnerability, mitigation and remediation can be found at:

    CP2024-002 Vulnerability Mitigation/Remediation for Small Office Multifunction Printers and Laser Printers – Canon PSIRT.

  • Several vulnerabilities have been identified for certain Small Office Multifunction Printers and Laser Printers.

    These vulnerabilities suggest the possibility that, if a product is connected directly to the Internet without using a router (wired or Wi-Fi), an unauthenticated remote attacker may be able to execute arbitrary code on the device. They may also be able to target the product in a Denial-of-Service (DoS) attack via the Internet.

    <Buffer Overflow>
    CVE-2023-6229
    CVE-2023-6230
    CVE-2023-6231
    CVE-2023-6232
    CVE-2023-6233
    CVE-2023-6234
    CVE-2024-0244

    There have been no reports of these vulnerabilities being exploited. However, to enhance the security of the product, we advise that our customers install the latest firmware available for the affected models provided below. We also recommend that customers set a private IP address for their products and create a network environment with a firewall or Wired/Wi-Fi router that can restrict network access.

    For more details on securing products when connected to a network, please visit Product Security.

    We will continue to further strengthen our security measures to ensure that you can continue using Canon products with peace of mind. If the vulnerabilities are identified in other products, we will update this article.

    Please check the affected models.

    Please visit Support for firmware, software, and product support information.

    Canon would like to thank the following researchers for identifying these vulnerabilities:

    • CVE-2023-6229: Nguyen Quoc (Viet) working with Trend Micro's Zero Day Initiative
    • CVE-2023-6230: Anonymous working with Trend Micro's Zero Day Initiative
    • CVE-2023-6231: Team Viettel working with Trend Micro's Zero Day Initiative
    • CVE-2023-6232: ANHTUD working with Trend Micro's Zero Day Initiative
    • CVE-2023-6233: ANHTUD working with Trend Micro's Zero Day Initiative
    • CVE-2023-6234: Team Viettel working with Trend Micro's Zero Day Initiative
    • CVE-2024-0244: Connor Ford (@ByteInsight) of Nettitude working with Trend Micro's Zero Day Initiative

  • Details of the vulnerability, mitigation and remediation can be found at:

    CP2023-003 Vulnerability Mitigation/Remediation for Inkjet Printers (Home and Office/Large Format) - Canon PSIRT

  • Description

    Two vulnerabilities have been identified for IJ Network Tool (Hereafter, the Software). These vulnerabilities suggest the possibility that an attacker connected to the same network as the printer may be able to acquire sensitive information on the Wi-Fi connection setup of the printer by using the Software or by referring to its communication.


    CVE/CVSS

    CVE-2023-1763: Acquisition of sensitive information on the Wi-Fi connection setup of the printer from the Software. CVSS v3 CVSS: 3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score: 6.5.

    CVE-2023-1764: Acquisition of sensitive information on the Wi-Fi connection setup of the printer from the communication of the Software. CVSS v3 CVSS: 3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score: 6.5.


    Affected Products

    The following models are affected by CVE-2023-1763: 

    Mac Network Tool: 

    MAXIFY iB4040, MAXIFY iB4050, MAXIFY iB4140, MAXIFY iB4150

    MAXIFY MB2040, MAXIFY MB2050, MAXIFY MB2140, MAXIFY MB2150, MAXIFY MB2155, MAXIFY MB2340, MAXIFY MB2350, MAXIFY MB2740, MAXIFY MB2750, MAXIFY MB2755, MAXIFY MB5040, MAXIFY MB5050, MAXIFY MB5140, MAXIFY MB5150, MAXIFY MB5155, MAXIFY MB5340, MAXIFY MB5350, MAXIFY MB5440, MAXIFY MB5450, MAXIFY MB5455

    PIXMA E464, PIXMA E484

    PIXMA G3400, PIXMA G3500, PIXMA G3501

    PIXMA iP110, PIXMA iP5200R, PIXMA iP7240, PIXMA iP7250, PIXMA iP8740, PIXMA iP8750

    PIXMA iX6840, PIXMA iX6850, PIXMA iX7000

    PIXMA MG2940, PIXMA MG2950, PIXMA MG3140, PIXMA MG3150, PIXMA MG3240, PIXMA MG3250, PIXMA MG3500, PIXMA MG3540, PIXMA MG3550, PIXMA MG3640, PIXMA MG3650, PIXMA MG4140, PIXMA MG4150, PIXMA MG4240, PIXMA MG4250, PIXMA MG5240, PIXMA MG5250, PIXMA MG5340, PIXMA MG5350, PIXMA MG5440, PIXMA MG5450, PIXMA MG5540, PIXMA MG5550, PIXMA MG5640, PIXMA MG5650, PIXMA MG5740, PIXMA MG5750, PIXMA MG6140, PIXMA MG6150, PIXMA MG6240, PIXMA MG6250, PIXMA MG6340, PIXMA MG6350, PIXMA MG6440, PIXMA MG6450, PIXMA MG6640, PIXMA MG6650, PIXMA MG6840, PIXMA MG6850, PIXMA MG6851, PIXMA MG6852, PIXMA MG6853, PIXMA MG7140, PIXMA MG7150, PIXMA MG7540, PIXMA MG7550, PIXMA MG7740, PIXMA MG7750, PIXMA MG7751, PIXMA MG7752, PIXMA MG7753, PIXMA MG8140, PIXMA MG8150, PIXMA MG8240, PIXMA MG8250

    PIXMA MP495, PIXMA MP560, PIXMA MP600R, PIXMA MP620, PIXMA MP640, PIXMA MP800R, PIXMA MP970, PIXMA MP980, PIXMA MP990

    PIXMA MX340, PIXMA MX350, PIXMA MX410, PIXMA MX420, PIXMA MX434, PIXMA MX435, PIXMA MX454, PIXMA MX455, PIXMA MX474, PIXMA MX475, PIXMA MX494, PIXMA MX495, PIXMA MX514, PIXMA MX515, PIXMA MX524, PIXMA MX525, PIXMA MX534, PIXMA MX535, PIXMA MX700, PIXMA MX714, PIXMA MX715, PIXMA MX725, PIXMA MX7600, PIXMA MX850, PIXMA MX860, PIXMA MX870, PIXMA MX884, PIXMA MX885, PIXMA MX894, PIXMA MX895, PIXMA MX924, PIXMA MX925

    PIXMA PRO-1, PIXMA PRO-10, PIXMA PRO-100, PIXMA PRO-100S, PIXMA PRO-10S

    Wireless Print Server WP-20

    Windows Network Tool: 

    Not applicable

    The following models are affected by CVE-2023-1764: 

    Mac Network Tool: 

    MAXIFY iB4040, MAXIFY iB4050, MAXIFY iB4140, MAXIFY iB4150

    MAXIFY MB2040, MAXIFY MB2050, MAXIFY MB2140, MAXIFY MB2150, MAXIFY MB2155, MAXIFY MB2340, MAXIFY MB2350, MAXIFY MB2740, MAXIFY MB2750, MAXIFY MB2755, MAXIFY MB5040, MAXIFY MB5050, MAXIFY MB5140, MAXIFY MB5150, MAXIFY MB5155, MAXIFY MB5340, MAXIFY MB5350, MAXIFY MB5440, MAXIFY MB5450, MAXIFY MB5455

    PIXMA E464, PIXMA E484

    PIXMA G3400, PIXMA G3500, PIXMA G3501

    PIXMA iP110, PIXMA iP5200R, PIXMA iP7240, PIXMA iP7250, PIXMA iP8740, PIXMA iP8750

    PIXMA iX6840, PIXMA iX6850, PIXMA iX7000

    PIXMA MG2940, PIXMA MG2950, PIXMA MG3140, PIXMA MG3150, PIXMA MG3240, PIXMA MG3250, PIXMA MG3500, PIXMA MG3540, PIXMA MG3550, PIXMA MG3640, PIXMA MG3650, PIXMA MG4140, PIXMA MG4150, PIXMA MG4240, PIXMA MG4250, PIXMA MG5240, PIXMA MG5250, PIXMA MG5340, PIXMA MG5350, PIXMA MG5440, PIXMA MG5450, PIXMA MG5540, PIXMA MG5550, PIXMA MG5640, PIXMA MG5650, PIXMA MG5740, PIXMA MG5750, PIXMA MG6140, PIXMA MG6150, PIXMA MG6240, PIXMA MG6250, PIXMA MG6340, PIXMA MG6350, PIXMA MG6440, PIXMA MG6450, PIXMA MG6640, PIXMA MG6650, PIXMA MG6840, PIXMA MG6850, PIXMA MG6851, PIXMA MG6852, PIXMA MG6853, PIXMA MG7140, PIXMA MG7150, PIXMA MG7540, PIXMA MG7550, PIXMA MG7740, PIXMA MG7750, PIXMA MG7751, PIXMA MG7752, PIXMA MG7753, PIXMA MG8140, PIXMA MG8150, PIXMA MG8240, PIXMA MG8250

    PIXMA MP495, PIXMA MP560, PIXMA MP600R, PIXMA MP620, PIXMA MP640, PIXMA MP800R, PIXMA MP970, PIXMA MP980, PIXMA MP990

    PIXMA MX340, PIXMA MX350, PIXMA MX410, PIXMA MX420, PIXMA MX434, PIXMA MX435, PIXMA MX454, PIXMA MX455, PIXMA MX474, PIXMA MX475, PIXMA MX494, PIXMA MX495, PIXMA MX514, PIXMA MX515, PIXMA MX524, PIXMA MX525, PIXMA MX534, PIXMA MX535, PIXMA MX700, PIXMA MX714, PIXMA MX715, PIXMA MX725, PIXMA MX7600, PIXMA MX850, PIXMA MX860, PIXMA MX870, PIXMA MX884, PIXMA MX885, PIXMA MX894, PIXMA MX895, PIXMA MX924, PIXMA MX925

    PIXMA PRO-1, PIXMA PRO-10, PIXMA PRO-100, PIXMA PRO-100S, PIXMA PRO-10S

    Wireless Print Server WP-20

    Windows Network Tool: 

    MAXIFY iB4040, MAXIFY iB4050

    MAXIFY MB2040, MAXIFY MB2050, MAXIFY MB2340, MAXIFY MB2350, MAXIFY MB5040, MAXIFY MB5050, MAXIFY MB5340, MAXIFY MB5350

    PIXMA E464, PIXMA E484

    PIXMA G3400, PIXMA G3500, PIXMA G3501

    PIXMA iP110, PIXMA iP5200R, PIXMA iP7240, PIXMA iP7250, PIXMA iP8740, PIXMA iP8750

    PIXMA iX6840, PIXMA iX6850, PIXMA iX7000

    PIXMA MG2940, PIXMA MG2950, PIXMA MG3140, PIXMA MG3150, PIXMA MG3240, PIXMA MG3250, PIXMA MG3500, PIXMA MG3540, PIXMA MG3550, PIXMA MG3640, PIXMA MG3650, PIXMA MG4140, PIXMA MG4150, PIXMA MG4240, PIXMA MG4250, PIXMA MG5240, PIXMA MG5250, PIXMA MG5340, PIXMA MG5350, PIXMA MG5440, PIXMA MG5450, PIXMA MG5540, PIXMA MG5550, PIXMA MG5640, PIXMA MG5650, PIXMA MG5740, PIXMA MG5750, PIXMA MG6140, PIXMA MG~6150, PIXMA MG6240, PIXMA MG6250, PIXMA MG6340, PIXMA MG6350, PIXMA MG6440, PIXMA MG6450, PIXMA MG6640, PIXMA MG6650, PIXMA MG6840, PIXMA MG6850, PIXMA MG6851, PIXMA MG6852, PIXMA MG6853, PIXMA MG7140, PIXMA MG7150, PIXMA MG7540, PIXMA MG7550, PIXMA MG7740, PIXMA MG7750, PIXMA MG7751, PIXMA MG7752, PIXMA MG7753, PIXMA MG8140, PIXMA MG8150, PIXMA MG8240, PIXMA MG8250

    PIXMA MP495, PIXMA MP560, PIXMA MP600R, PIXMA MP620, PIXMA MP640, PIXMA MP800R, PIXMA MP970, PIXMA MP980, PIXMA MP990

    PIXMA MX340, PIXMA MX350, PIXMA MX410, PIXMA MX420, PIXMA MX434, PIXMA MX435, PIXMA MX454, PIXMA MX455, PIXMA MX474, PIXMA MX475, PIXMA MX494, PIXMA MX495, PIXMA MX514, PIXMA MX515, PIXMA MX524, PIXMA MX525, PIXMA MX534, PIXMA MX535, PIXMA MX700, PIXMA MX714, PIXMA MX715, PIXMA MX725, PIXMA MX7600, PIXMA MX850, PIXMA MX860, PIXMA MX870, PIXMA MX884, PIXMA MX885, PIXMA MX894, PIXMA MX895, PIXMA MX924, PIXMA MX925

    PIXMA PRO-1, PIXMA PRO-10, PIXMA PRO-100, PIXMA PRO-100S, PIXMA PRO-10S

    Wireless Print Server WP-20

    Affected Versions

    The following versions are affected by CVE-2023-1763: 

    Mac Network Tool: 

    Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13) 

    Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8)


    Windows Network Tool: 

    Not applicable


    The following versions are affected by CVE-2023-1764: 

    Mac Network Tool: 

    Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13) 

    Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8)


    Windows Network Tool: 

    Ver.3.7.0


    Mitigation/Remediation

    For CVE-2023-1763: 

    The workaround for this vulnerability is to use printers with a trusted network connection. Please refer here for “Security for Product Connecting to a Network”. 

    In addition, for Mac Network Tool, please download the updated software versions released. 

    For steps on how to update the software for MAXIFY and PIXMA inkjet printers to Ver.4.7.6 (supported OS: OS X 10.9.5-macOS 13) or Ver.4.7.4 (supported OS: OS X 10.7.5-OS X 10.8), please visit software download page Consumer Product Support and select your model, select Software tab and select IJ network tool or Wi-Fi Connection Assistant.

    For CVE-2023-1764: 

    The workaround for this vulnerability is to use printers with a trusted network connection. Please refer here for “Security for Product Connecting to a Network”.

    Credits

    Canon would like to thank National Cyber Security Centre Netherlands for reporting these vulnerabilities.

  • Several vulnerabilities have been identified for certain Office/Small Office Multifunction Printers, Laser Printers and Inkjet Printers.

    These vulnerabilities suggest the possibility that, if a product is connected directly to the Internet without using a router (wired or Wi-Fi), an unauthenticated remote attacker may be able to execute arbitrary code on the device. They may also be able to target the product in a Denial-of-Service (DoS) attack via the Internet. An attacker may also be able to install arbitrary files due to improper authentication of RemoteUI.

    <Buffer Overflow>
    CVE-2023-0851
    CVE-2023-0852
    CVE-2023-0853
    CVE-2023-0854
    CVE-2023-0855
    CVE-2023-0856
    CVE-2022-43974

    <Problems during Initial Registration of System Administrators in Control Protocols>
    CVE-2023-0857

    <Improper Authentication of RemoteUI>
    CVE-2023-0858

    <Installation of Arbitrary Files>
    CVE-2023-0859

    There have been no reports of these vulnerabilities being exploited. However, to enhance the security of the product, we advise that our customers install the latest firmware available for the affected models provided below. We also recommend that customers set a private IP address for their products and create a network environment with a firewall or Wired/Wi-Fi router that can restrict network access.

    For more details on securing products when connected to a network, please visit Product Security.

    We will continue to further strengthen our security measures to ensure that you can continue using Canon products with peace of mind. If the vulnerabilities are identified in other products, we will update this article.

    Please check the affected models.

    Please visit Support for firmware, software, and product support information.

    For steps on how to update the firmware for MAXIFY, PIXMA and imagePROGRAF inkjet printers, please view the Online Manual.

    Canon would like to thank the following researchers for identifying these vulnerabilities:

    • CVE-2023-0851: Namnp, Le Tran Hai Tung, ANHTUD working with Trend Micro's Zero Day Initiative
    • CVE-2023-0852: R-SEC, Nettitude working with Trend Micro's Zero Day Initiative
    • CVE-2023-0853: DEVCORE working with Trend Micro's Zero Day Initiative
    • CVE-2023-0854: DEVCORE working with Trend Micro's Zero Day Initiative
    • CVE-2023-0855: Chi Tran working with Trend Micro's Zero Day Initiative
    • CVE-2023-0856: Team Viettel working with Trend Micro's Zero Day Initiative
    • CVE-2023-0857: Alex Rubin and Martin Rakhmanov
    • CVE-2023-0858: Alex Rubin and Martin Rakhmanov
    • CVE-2023-0859: Alex Rubin and Martin Rakhmanov

  • A potential data exposure vulnerability has been identified in uniFLOW Server and uniFLOW Remote Print Server.

    Whilst we have not received any reports of exploitation, we recommend that you upgrade your implementation to the latest version.

    Details of the vulnerability, mitigation and remediation can be found at:

    Security Advisory: MOM Tech Support Vulnerability - NT-ware Support

  • Multiple cases of buffer overflow vulnerabilities have been identified with Canon Laser Printers and Small Office Multifunctional Printers.

    Whilst we have not received any reports of exploitation, we recommend that you upgrade your device firmware to the latest version.

    This vulnerability suggests that if a product is connected directly to the Internet without using a wired or Wi-Fi router, a third party on the Internet could execute arbitrary code or the product could be subjected to a Denial-of Service (DoS) attack.

    We do not recommend connecting directly to the Internet – please use a private IP address on a secure private network configured via a firewall or wired/WiFi router. Please see www.canon-europe.com/support/product-security for ‘security for product connected to a network.’

    We will continue to further strengthen our security measures to ensure that you can continue using Canon products with peace of mind. If the vulnerability is identified in other products, we will update this article.

    Please check the affected models.

    Please visit Support for firmware, software and product support information.

    Canon would like to thank the following researcher for identifying this vulnerability.

    • CVE-2022-43608: Angelboy (@scwuaptx) from DEVCORE Research Team working with Trend Micro's Zero Day Initiative

  • Multiple cases of buffer overflow vulnerabilities have been identified with Canon Laser Printers and Small Office Multifunctional Printers. Related CVEs are: CVE-2022-24672, CVE-2022-24673 and CVE-2022-24674. A list of affected models is given below.

    Whilst we have not received any reports of exploitation, please upgrade the device firmware to the latest version.

    This vulnerability suggests the possibility that if a product is connected directly to the Internet without using a wired or Wi-Fi router, a third party on the Internet may execute arbitrary code or the product could be subjected to Denial-of Service (DoS) attack.

    We do not recommend connecting directly to the Internet – please use a private IP address on a secure private network configured via a firewall or wired/WiFi router. Please see www.canon-europe.com/support/product-security for ‘security for product connected to a network.’

    We will continue to work to further strengthen security measures to ensure that you can continue using Canon products with peace of mind. If vulnerabilities are identified in other products, we will immediately update this article.

    The Laser Printers and Small Office Multifunction Printers, which require the countermeasure:


    imageRUNNER 1133, 1133A, 1133iF3
    imageRUNNER 1435, 1435i, 1435iF, 1435P
    imageRUNNER 1643i II, 1643iF II
    imageRUNNER 1643i, 1643iF
    imageRUNNER C1225, C1225iF
    imageRUNNER C1325iF, C1335iF, C1335iFC
    imageRUNNER C3025, C3025i
    imageRUNNER C3125i
    i-SENSYS LBP214dw, LBP215x
    i-SENSYS LBP223dw, LBP226dw, LBP228x
    i-SENSYS LBP233dw, LBP236dw
    i-SENSYS LBP251dw, LBP252dw, LBP253x
    i-SENSYS LBP611Cn, LBP613Cdw
    i-SENSYS LBP621Cw, LBP623Cdw
    i-SENSYS LBP631Cw, LBP633Cdw
    i-SENSYS LBP653Cdw, LBP654x
    i-SENSYS LBP663Cdw, LBP644Cx
    i-SENSYS MF411dw, MF416dw, MF418x, MF419x
    i-SENSYS MF421dw, MF426dw, MF428x, MF429x
    i-SENSYS MF443dw MF445dw, MF446x, MF449x
    i-SENSYS MF453dw, MF455dw
    i-SENSYS MF512x, MF515x
    i-SENSYS MF542x, MF543x
    i-SENSYS MF552dw, MF553dw
    i-SENSYS MF6140dn, MF6180dw
    i-SENSYS MF623Cn, MF628Cw
    i-SENSYS MF631Cn, MF633Cdw, MF635Cx
    i-SENSYS MF641Cw, MF643Cdw, MF645Cx
    i-SENSYS MF651Cw, MF655Cdw, MF657Cdw
    i-SENSYS MF724Cdw, MF728Cdw, MF729Cx
    i-SENSYS MF732Cdw, MF734Cdw, MF735Cx
    i-SENSYS MF742Cdw, MF 744Cdw, MF746Cx
    i-SENSYS MF8230Cn, MF8230Cw
    i-SENSYS MF8540Cdn, MF8550Cdn, MF8580Cdw
    i-SENSYS X 1238i II, 1238iF II
    i-SENSYS X 1238i, 1238iF
    i-SENSYS X 1238Pr II, 1238P II
    i-SENSYS X 1238Pr, 1238P
    i-SENSYS X C1127i, C1127iF
    i-SENSYS X C1127P
    WG7440, 7450, 7450F, 7450Z
    WG7540, 7550, 7550F, 7550Z

    Please visit Support for firmware, software and product support information.

    CANON would like to thank the following people for identifying this vulnerability.

    • CVE-2022-24672: Mehdi Talbi (@abu_y0ussef), Remi Jullian (@netsecurity1), Thomas Jeunet (@cleptho), from @Synacktiv working with Trend Micro's Zero Day Initiative
    • CVE-2022-24673: Angelboy (@scwuaptx) from DEVCORE Research Team working with Trend Micro's Zero Day Initiative
    • CVE-2022-24674: Nicolas Devillers ( @nikaiw ), Jean-Romain Garnier and Raphael Rigo ( @_trou_ ) working with Trend Micro's Zero Day Initiative

  • A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. The malicious class file can do virtually anything: leak data or secrets, launch other software such as ransomware, mine cryptocurrencies, introduce backdoors or create a steppingstone further into a network.

    https://cpp.canon/products-technologies/security/latest-news/

    The goal of this page is to list the Canon Production Printing (CPP) products that may be impacted by the following CVE reports:

    • CVE-2022-22947
    • CVE-2022-22950
    • CVE-2022-22963
    • CVE-2022-22965

    The table below gives the vulnerability status for the Canon Production Printing hardware and software products listed. Please check back regularly to be informed regarding the updated status.

    Products assessed and status

    CTS – Cutsheet and Toner Systems / Inkjet Sheetfed Press

    Products

    Status

    PRISMAsync print server based products

    Not impacted

    varioPRINT 140 series

    Not impacted

    varioPRINT 6000 series

    Not impacted

    varioPRINT i-series

    Not impacted

    varioPRINT iX-series

    Not impacted

    Service Control Station (SCS) for VPi300 series and VPiX series

    Not impacted

    Tablet for VPi300 series and VPiX series

    Not impacted

    PRISMAsync i300/iX Simulator

    Not impacted

    PRISMAprepare V6

    Not impacted

    PRISMAprepare V7

    Not impacted

    PRISMAprepare V8

    Not impacted

    PRISMAdirect V1

    Not impacted

    PRISMAprofiler

    Not impacted

    PRISMA Cloud

    PRISMA Home

    PRISMAprepare Go

    PRISMAlytics Accounting

    Not impacted


    PPP – Production Printing Products

    Products

    Status

    ColorStream 3×00

    ColorStream 3x00Z

    Not impacted

    Colorstream 6000

    Not impacted

    ColorStream 8000

    Not impacted

    ProStream 1×00

    Not impacted

    LabelStream 4000 series

    Not impacted

    ImageStream

    Not impacted

    JetStream V1

    JetStream V2

    Not impacted

    VarioStream 4000

    Not impacted

    VarioStream 7000 series

    Not impacted

    VarioStream 8000

    Not impacted

    PRISMAproduction Server V5

    Not impacted

    PRISMAproduction Host

    Not impacted

    PRISMAcontrol

    Not impacted

    PRISMAspool

    Not impacted

    PRISMAsimulate

    New version available*

    TrueProof

    Not impacted

    DocSetter

    Not impacted

    DPconvert

    Not impacted

    * Please contact your local Canon service representative

    LFG – Large Format Graphics

    Products

    Status

    Arizona series

    under investigation

    Colorado series

    Not impacted

    ONYX HUB

    under investigation

    ONYX Thrive

    under investigation

    ONYX ProductionHouse

    under investigation


    TDS – Technical Documentation Systems

    Products

    Status

    TDS series

    Not impacted

    PlotWave series

    Not impacted

    ColorWave series

    Not impacted

    Scanner Professional

    Not impacted

    Driver Select, Driver Express, Publisher Mobile

    Not impacted

    Publisher Select

    Not impacted

    Account Console

    Not impacted

    Repro Desk

    Not impacted


    Service & Support Tools

    Products

    Status

    On Remote Service

    Not impacted

  • A vulnerability had been confirmed in the RSA key generating process in the Cryptographic library mounted on Canon’s Enterprise/Small Office Multifunction Printers and Laser Printers/Inkjet Printers. A full list of affected products is included below.

    The risk of this vulnerability is the possibility of private key for RSA public key being estimated by someone, due to issues in the generation process of RSA key pair.
    If the RSA key pair is used for TLS or IPSec, is generated by a Cryptographic library with this vulnerability, this RSA public key could be taken by a third party or even be falsified.

    We have not received any incident reports regarding this vulnerability so far and users can rest assured if firmware on the impacted products is being resolved

    Where the RSA key pair had been created by the Cryptographic library with this vulnerability, additional steps are required after the firmware update. Depending on the affected, refer to Steps to check the key and measure to be taken described below to take a correct action.

    In addition, do not connect the products directly to the internet, but use firewall, wire connected environment or securely protected private network environment if using Wi-Fi router. Set a private IP address as well.

    For details, please refer to Securing products when connecting to a network.

    Enterprise/Small Office Multifunction Printers and Laser Printers/Inkjet Printers, which require the measure.

    imagePROGRAF TZ-30000
    imagePROGRAF TX-4100/3100/2100
    iPR C165/C170
    iR 1643i II, iR 1643iF II
    iR 2425
    iR 2645/2635/2630
    iR-ADV 4551/4545/4535/4525
    iR-ADV 4551Ⅲ/4545 Ⅲ/4535 Ⅲ/4525 Ⅲ
    iR-ADV 4725/4735/4745/4751
    iR-ADV 527/617/717
    iR-ADV 6000
    iR-ADV 6575/6565/6560/6555
    iR-ADV 6575Ⅲ/6565Ⅲ/6560Ⅲ
    iR-ADV 6755/6765/6780
    iR-ADV 6855/6860/6870
    iR-ADV 715/615/525
    iR-ADV 715Ⅲ/615Ⅲ/525Ⅲ
    iR-ADV 8505/8595/8585
    iR-ADV 8505Ⅲ/8595Ⅲ/8585Ⅲ
    iR-ADV 8705/8705B/8795
    iR-ADV C256Ⅲ/C356Ⅲ
    iR-ADV C257/C357
    iR-ADV C3530/C3520
    iR-ADV C3530Ⅲ/C3520Ⅲ
    iR-ADV C355/255
    iR-ADV C356/256
    iR-ADV C3730/C3720
    iR-ADV C3830/C3826/C3835
    iR-ADV C475Ⅲ
    iR-ADV C477/C478
    iR-ADV C5560/5550/5540/5535
    iR-ADV C5560Ⅲ/5550Ⅲ/5540Ⅲ/5535Ⅲ
    iR-ADV C5760/5750/5740/5735
    iR-ADV C5870/C5860/C5850/C5840
    iR-ADV C7580/C7570/C7565
    iR-ADV C7580Ⅲ/C7570Ⅲ/C7565Ⅲ
    iR-ADV C7780/C7770/C7765
    iRC3226
    i-SENSYS X 1238 II, i-SENSYS X 1238iF II
    i-SENSYS X 1238P II, i-SENSYS X 1238Pr II
    LBP233Dw, LBP236Dw
    LBP631Cw, LBP633Cdw
    MF 453dw, MF455dw
    MF552dw, MF553dw
    MF651dw, MF655Cdw, MF657Cdw
    PRO-G1/PRO-300,PRO-S1/PRO-200
    imagePROGRAF GP-200/300/2000/4000
    MAXIFY GX6040
    MAXIFY GX6050
    MAXIFY GX7040
    MAXIFY GX7050
    MF830Cx, MF832Cx, MF832Cdw, iR C1533, C1538
    LBP720Cx/LBP722Cx/LBP722Ci/LBP722Cdw/C1533P/C1538P

    Steps to check and resolve for Inkjet Printers key

    Please visit Support for firmware, software and product support information.

  • We are currently in the process of investigating the impact of the ‘Log4j’ https://logging.apache.org/log4j/2.x/security.html vulnerability on Canon products. As information comes to light, we will update this article.

    The table below gives the vulnerability status for the hardware and software products listed. Please check back regularly.

    Product

    Status/Statement

    Canon

    • imageRUNNER

    • imageRUNNER ADVANCE

    • imagePRESS

    • i-SENSYS

    • i-SENSYS X

    • imagePROGRAF

    • imageFORMULA

    These devices are not affected.

    Canon

    • imageWARE Management Console

    • imageWARE Enterprise Management Console

    • eMaintenance Optimiser

    • eMaintenance Universal Gateway

    • Canon Data Collection Agent

    • Remote Support Operator Kit

    • Content Delivery Service

    • Device Settings Configurator

    • Canon Reporting Service Online

    • OS400 Object Generator

    • CQue Driver

    • SQue Driver

    Software not affected.

    Canon Production Printing

    • PRISMA Cutsheet and Toner systems

    • Continuous Printing

    • Large Format Graphics

    • Technical Document Systems

    https://cpp.canon/products-technologies/security/latest-news/

    NT-ware

    • uniFLOW

    • uniFLOW Online

    • uniFLOW Online Express

    • uniFLOW sysHub

    • PRISMAsatellite

    https://www.uniflow.global/en/security/security-and-maintenance/

    Avantech

    • Scan2x

    • Scan2x Online

    Scan2x statement on Log4J vulnerability - scan2x

    Cirrato

    • Cirrato One

    • Cirrato Embedded

    Not affected.

    Compart

    • DocBridge Suite

    Information - Compart

    Docspro

    • Import Controller

    • XML Importer

    • Email Importer

    • Knowledge Base

    • Universal Test Release

    • Advanced PDF Creator

    • Webservice Export Connector

    Not affected.

    Docuform

    • Mercury Suite

    Not affected.

    Doxsense

    • WES Pull Print 2.1

    • WES Authentication 2.1

    Not affected.

    EFI

    • Fiery

    https://communities.efi.com/s/feed/0D55w00009ARpbxCAD?language=en_US

    Genius Bytes

    • Genius MFP Canon Client

    Log4j Zero Day Vulnerability - Genius Bytes

    Not affected

    IRIS

    • IRISXtract

    • IRISPowerscan

    • Readiris PDF 22

    • Readiris 16 & 17

    • Cardiris

    • IRISPulse

    IRIS-Statement-Log4J_20141217.pdf (irisdatacapture.com)

    Kantar

    • Discover Assessment Web Survey

    Not affected.

    Kofax

    • PowerPDF

    • eCopy ShareScan

    • Robotic Process Automation

    • Kofax Communication Manager Solution

    Kofax products and Apache Log4j2 vulnerability information - Kofax

    Not affected.

    Until the ShareScan patches are ready, follow the steps in the ShareScan and Log4j vulnerability (CVE-2021-44228) - Kofax article.

    Patches are available. See Kofax RPA CVE-2021-44228 log4j Security Exploit Information article.

    Patches are available. See log4j vulnerability in Kofax Communications Manager article.

    Netaphor

    • SiteAudit

    SiteAudit Vulnerability Exposure | Netaphor SiteAudit(TM) Knowledgebase

    Netikus

    • EventSentry

    Is EventSentry affected by the Log4Shell Log4j RCE CVE-2021-44228 | EventSentry

    Newfield IT

    • Asset DB

    Not affected.

    Objectif Lune

    • Connect

    Past versions of Objectif Lune Connect used the log4j module, but it was removed from the software with the release of Objectif Lune Connect 2018.1. So as long as you are running a version of Objectif Lune Connect that is 2018.1 or later, the vulnerability is not present.

    OptimiDoc

    • OptimiDoc

    OptimiDoc | Log4j information

    Overall

    • Print In City

    Not affected.

    PaperCut

    • PaperCut

    Log4Shell (CVE-2021-44228) - How is PaperCut Affected? | PaperCut

    Paper River

    • TotalCopy

    Not affected.

    Ringdale

    • FollowMe Embedded

    Not affected.

    Quadient

    • Inspire Suite

    Quadient University Log4J Information for Existing Customers

    T5 Solutions

    • TG-PLOT/CAD-RIP

    Not affected.

    Therefore

    • Therefore

    • Therefore Online

    https://therefore.net/log4j-therefore-unaffected/

    Westpole

    • Intelligent Print Management

    Not affected.

  • A cross-site scripting vulnerability has been identified in the Remote UI function of Canon laser printers and multifunction devices for small office – see the affected models below (vulnerability identification number: JVN # 64806328).

    For this vulnerability to be exploited, it is necessary for the attacker to be in the administrator mode. Whilst there have been no reports of data loss, we advise installing the latest firmware to enhance security. Updates can be found at https://www.canon-europe.com/support/.

    We also recommend that a private IP address is set and a network environment ensuring that connection is established through a firewall or Wi-Fi router that can restrict network access. Please see https://www.canon-europe.com/support/product-security/ for more details of security measures when connecting devices to a network.

    Affected products:

    iSENSYS

    LBP162DW
    LBP113W
    LBP151DW<
    MF269dw, MF267dw, MF264dw
    MF113w
    MF249dw, MF247dw, MF244dw, MF237w, MF232w
    MF229dw, MF217w, MF212w
    MF4780w, MF4890dw

    imageRUNNER

    2206IF
    2204N, 2204F

  • A vulnerability with Microsoft Windows Print Spooler was discovered earlier this year, which has been referred to as “PrintNightmare”. The vulnerability allows hackers to take control users' Windows systems under certain conditions.

    While this may affect the users of Canon devices, this is the result of a flaw within Microsoft software rather than any issue with Canon's products or software. Specifically, the issue lies with the print spooler functionality which is installed on every Windows Server and Windows desktop.

    Microsoft announced that these vulnerabilities were resolved within the Microsoft July 6th Security Update, available through Windows Update or by downloading and installing KB5004945. Microsoft recommends that IT teams apply this update immediately to help prevent intrusions related to these vulnerabilities. For full information from Microsoft on the matter, please visit https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527

    In addition to Microsoft’s advice to install the updates, we also recommend you secure your system by confirming that the following registry settings are set to 0 (zero) or are not defined (Note: these registry keys do not exist by default, and therefore are already at the secure setting). You should also check that your Group Policy settings are correct:

    • HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
    • NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)
    • UpdatePromptSettings = 0 (DWORD) or not defined (default setting)

    Having the ‘NoWarningNoElevationOnInstall’ registry key set to 1 reduces your system security posture.

    We advise that your IT team continues to monitor the Microsoft support site to ensure that all applicable underlying operating system patches are applied.

  • Following investigation, we have determined that no imageRUNNER, imageRUNNER ADVANCE or i-SENSYS products are affected by this vulnerability. We are continuing our investigation across the Canon product range and will update this article as further information becomes available.

  • It has been brought to our attention by the 'Federal Office for Information Security' (BSI) that the network implementation within the microMIND is vulnerable to a number of exploits. These vulnerabilities were discovered by 'Forescout Technologies', researchers Jos Wetzels, Stanislav Dashevskyi, Amine Amri, and Daniel dos Santos.

    The microMIND utilises the uIP open-source network stack, https://en.wikipedia.org/wiki/UIP_(micro_IP) used by thousands of companies to network enable their software/hardware. The researchers found that if exploited these vulnerabilities could result in a DoS attack taking the device offline or performing Remote Code Execution (RCE) on the microMIND itself. To address these vulnerabilities NT-ware has released a new firmware that addresses all reported issues. At the time of writing this security bulletin there are no known exploits targeting the microMIND.

    Exploit name/link: AMNESIA:33, https://www.forescout.com/amnesia33/

    CVE's addressed in this firmware are: CVE-2020-13988, CVE-2020-13987, CVE-2020-17438, CVE-2020-17437

    CVE's not related to the MicroMIND implementation of the uIP Stack: CVE-2020-17440, CVE-2020-17439, CVE-2020-24334, CVE-2020-24335

    Affected uniFLOW microMIND Firmware: version 2.0.9 and earlier or delivered prior to October 2020.

    Mitigation/Action: If you have an affected microMIND please contact your Canon representative to arrange upgrading the firmware.

  • A cyber security company headquartered in Israel, SCADAfence Ltd., drew our attention to a vulnerability related to IP stack protocol, which is used by Canon Laser Printer and Small Office Multifunctional Printer. Please refer to CVE-2020-16849 for details.

    The potential exists for a third-party attack on the device when it is connected to a network allowing fragments of the “Address book” or/and “administrator password” to be acquired through an unsecured network. It should be noted that when HTTPS is used for the communication of Remote UI, data is secured by encryption.

    To date, there have been no confirmed cases of these vulnerabilities being exploited to cause harm. However, in order to ensure that our customers can use our products securely, new firmware will be available for the following products:

    i-SENSYS MF Series
    MF113W
    MF212W/MF216N/MF217W
    MF226DN/MF229DW
    MF231/MF232W/MF237W
    MF244DW/MF247DW/MF249DW
    MF264DW/MF267DW/MF269DW
    MF4570DN/MF4580DN
    MF4780W
    MF4870DN/MF4890DW

    i-SENSYS LBP Series
    LBP113W
    LBP151DW
    LBP162DW

    imageRUNNER Series
    IR2202N
    IR2204N/IR2204F
    IR2206N/IR2206IF

    Please refer to the User Manual for details on how to update firmware.
    We recommend that a private IP address is used for products and use network parameter controls such as the use of a firewall or Wi-Fi router that can restrict network access. The ‘Security for Products Connected to a Network’ section further down on this page gives some additional guidance.

  • After investigation into the ‘Ripple20’ vulnerability, there has been no identified issue with Canon printer products.

  • Whilst Canon’s wireless function password complies with the current WPA standard, we are aware that the security provided by eight-character numerical passwords isn’t considered to be as strong as it used to be. With this in mind, we recommend that in environments where wireless security is a concern, such as a public location, Canon equipment should always be connected to infrastructure Wi-Fi deployment. We take security seriously - we are updating the Wi-Fi security configurations across our products to help you remain secure and any update will be published on these pages. Canon would like to thank REDTEAM.PL for drawing our attention to the changing nature of password security and its impact on the market.

  • The imageRUNNER ADVANCE software platform version 3.8 and later introduced the Syslog protocol (compliant with RFC 5424, RFC 5425 and RFC 5426) near real-time event messaging functionality adding to existing device logging increasing visibility of device and device security events. This builds upon the device logging capability allowing connection to an existing security information event management (SIEM) or Syslog server. The ‘SIEM_spec’ document given below details of the messages types and log data that can be generated.

  • Eleven vulnerabilities, dubbed “URGENT/11” (CVE-2019-12255 through to CVE-2019-12265), have been identified within the VxWorks operating system. It has transpired that the IPnet TCP/IP stack used in the VxWorks operating system has also been used in other real-time operating systems, opening up the possibility for vulnerabilities (CVE-2019-12255, CVE-2019-12262 and CVE-2019-12264) to exist in a broader range of products.

    A number of legacy European models may be vulnerable to this issue as they have been identified as using the affected IPnet TCP/IP stack:

    • i-SENSYS MF4270
    • i-SENSYS MF4370dn
    • i-SENSYS MF4380dn
    • imageRUNNER 2318
    • imageRUNNER 2318L
    • imageRUNNER 2320
    • imageRUNNER 2420
    • imageRUNNER 2422
    We would recommend that you review your network security controls and/or upgrade to the latest equivalent Canon device. Further information can found in the Canon MFD Hardening Guide (link is given at the bottom of this page) and at our Canon global page.

  • Thank you very much for using Canon products.

    An international team of security researchers has drawn our attention to a vulnerability related to communications via the Picture Transfer Protocol (PTP), which is used by Canon digital cameras, as well as a vulnerability related to firmware updates.

    (CVE-ID:CVE-2019-5994, CVE-2019-5995, CVE-2019-5998, CVE-2019-5999, CVE-2019-6000, CVE-2019-6001)

    Due to these vulnerabilities, the potential exists for third-party attack on the camera if the camera is connected to a PC or mobile device that has been hijacked through an unsecured network.

    At this point, there have been no confirmed cases of these vulnerabilities being exploited to cause harm, but in order to ensure that our customers can use our products securely, we would like to inform you of the following workarounds for this issue.

    • Ensure the suitability of security-related settings of the devices connected to the camera, such as the PC, mobile device, and router being used.
    • Do not connect the camera to a PC or mobile device that is being used in an unsecure network, such as in a free Wi-Fi environment.
    • Do not connect the camera to a PC or mobile device that is potentially exposed to virus infections.
    • Disable the camera’s network functions when they are not being used.
    • Download the official firmware from Canon’s website when performing a camera firmware update.

    There is an increase use of PCs and mobile devices in an unsecure (free Wi-Fi) network environment where customers are not aware of the network security. As it has become prevalent to transfer images from a camera to a mobile device via Wi-Fi connection, we will implement firmware updates for the following models that are equipped with the Wi-Fi function.


    These vulnerabilities affect the following EOS-series digital SLR and mirrorless cameras:


    EOS-1DC*1 *2 EOS 6D Mark II EOS 760D EOS M6 Mark II PowerShot SX740 HS
    EOS-1DX*1 *2 EOS 7D Mark II*1  EOS 800D EOS M10
    EOS-1DX MK II*1 *2  EOS 70D EOS 1300D EOS M50
    EOS 5D Mark III*1 EOS 77D EOS 2000D EOS M100
    EOS 5D Mark IV EOS 80D EOS 4000D EOS R
    EOS 5DS*1 EOS 200D EOS M3 EOS RP
    EOS 5DS R*1 EOS 250D EOS M5 PowerShot G5X Mark II
    EOS 6D EOS 750D EOS M6 PowerShot SX70 HS

    *1 If a WiFi adapter or a Wireless file transmitter is used, WiFi connection can be established.

    *2 Ethernet connections are also affected by these vulnerabilities.

    Firmware update information will be provided for each product in turn starting from products for which preparations have been completed.

  • We have identified a security issue that exists in certain circumstances of using uniFLOW and NT-Ware has issued a hotfix to resolve this. We strongly recommend you run this fix on your system as soon as possible.  
    There is a possibility of gaining unauthorised access where "Username/Password" is used as authentication or the card learning mechanism is utilised.
     
    This only affects particular versions of the software, when used with these authentication methods: 
     
    • uniFLOW V5.1 SRx
    • uniFLOW V5.2 SRx
    • uniFLOW V5.3 SRx
    • uniFLOW V5.4 SR10 (revised hotfix) and above
    • uniFLOW 2018 LTS SRx (revised hotfix)
    • uniFLOW 2018 v-Releases (revised hotfix)
     
    If you are using uniFLOW V5.1 SRx, uniFLOW V5.2 SRx or uniFLOW V5.3 SRx please contact your authorised reseller or Canon support representative.

    Please find instructions to install the hotfix here 

    We are committed to providing secure solutions to our customers and apologise for any inconvenience this situation has caused. Should you require further information regarding this advisory, please contact your local Canon office, authorised reseller or Canon support representative. If you notice any suspicious activity, please report these immediately to your account manager and IT department.

  • Recently, researchers reported on vulnerabilities found in the communication protocols in the fax functions of certain products. (CVE-ID: CVE-2018-5924, CVE 2018-5925). For information regarding the impact of these vulnerabilities on Canon products equipped with fax functions, please see below:

    Based on our review, as they do not employ the colour G3 Fax Protocol exploited by these vulnerabilities, the following products are unaffected: imageRUNNER/iR, imageRUNNER ADVANCE, LASER CLASS, imagePRESS, FAXPHONE, GP and imageCLASS/i-SENSYS series models equipped with fax functions.

    MAXIFY and PIXMA series products equipped with fax functions do make use of the Colour G3 Fax Protocol. However, we have not identified any risk of malicious code being executed via the fax circuit or risk to the security of information saved on these devices.

    We will continue to monitor this situation and take appropriate action necessary to help ensure the security of our devices.

  • Vulnerabilities were recently made public regarding certain CPUs from Intel, AMD and ARM that make use of speculative execution to improve their performance. These vulnerabilities may allow an attacker to gain unauthorised access to areas of private cached memory.

    Two variants of the vulnerabilities that use different techniques to exploit the speculative execution functions within the affected CPUs were identified and named. They are CVE-2017-5715, CVE-2017-5753: “Spectre” and CVE-2017-5754: “Meltdown”.

    The following Canon external controller products may be impacted by the vulnerabilities. Though there is currently no known way to exploit these vulnerabilities, countermeasures are being prepared so that customers can continue to use our products without concern.

    ColorPASS: 
    GX300 v2.0, GX300 v2.1, GX400 v1.0, GX500 v1.1

    imagePASS: 
    U1 v1.1, U1 v1.1.1, U2 v1.0 
    Y1 v1.0, Y2 v1.0

    imagePRESS-CR Server: 
    A7000 v2.1, A7000 v3.0, A7300 v1.0, A7500 v2.1, A8000 v1.1

    imagePRESS Server: 
    A1200 v1.0, A1200 v1.1, A1300 v1.0, A2200 v1.0, A2200 v1.1, A2300 v1.0, A3200 v1.0, A3200 v1.1, A3300 v1.0 
    B4000 v1.0, B4100 v1.0, B5000 v1.0, B5100 v1.0 
    F200 v1.21, H300 v1.0 
    J100 v1.21, J200 v1.21 
    K100 v1.0, K200 v1.0 
    Q2 v2.0, Z1 v1.0


    The following Canon service may be impacted by the vulnerabilities. Though there is currently no known way to exploit these vulnerabilities, countermeasures were put in place by end of February 2018.

    MDS Cloud

    All Canon laser multifunction printers and Canon laser printers and their related software products, except the above-mentioned, are not affected by these vulnerabilities through any known exploitation process. Customers can continue using our products reliably.

    Canon is constantly working to ensure the highest level of security is reached in all our products and solutions. We take the security of our customer information seriously and its protection is our utmost priority.

  • Recently, a researcher made public a vulnerability known as KRACKs in the standard wireless LAN (Wi-Fi) encryption protocol WPA2. This vulnerability allows an attacker to intentionally intercept the wireless transmission between the client (terminal equipped with Wi-Fi functionality) and the access point (the router etc.) to perform potentially malicious activity. For that reason, this vulnerability cannot be exploited by anyone outside the range of the Wi-Fi signal or by anyone in a remote location using the internet as an intermediary. 


    We have yet to confirm that any issues have been encountered by users of Canon products as a result of this vulnerability, however, in order to allow customers to continue using our products with peace of mind, we recommend the following preventative measures: 
    •Use a USB cable or Ethernet cable to directly connect compatible devices to a network 
    •Encrypt data transmission from devices that enable encryption settings (TLS/IPSec) 
    •Use such physical media as SD cards with compatible devices 
    •Use such settings as Wireless Direct and Direct Connect with compatible devices


    As the operation procedures and functions offered vary from device to device, please consult your device’s manual for more details. We also recommend you take appropriate measures for such devices as your PC or smartphone. For information on the appropriate measures for each device, please contact the device’s manufacturer.

Whitepapers

  • We are aware of news articles regarding research from University Alliance Ruhr concerning potential vulnerability for networked printers via the PostScript programming language used widely across our industry. No Canon devices were tested in the research.

    Canon works constantly to ensure the highest level of security in all of our products and solutions, including networked printers. We take the security of our customer’s information seriously and its protection is our utmost priority. Our MFD Hardening Guide explains and advises on the best configuration settings for secure implementation.

    Information regarding security measures for specific Canon products and their set-up procedures are outlined below. Please note, the information is only available in English.


    Inkjet Printers (PIXMA series) and Business Inkjet Printers (MAXIFY series) - 530KB

    Fiery Controllers (imagePRESS Server, ColorPASS, imagePASS) - 1.2MB

    Large Format Inkjet Printer (imagePROGRAF Series) - 1.15MB

    Laser Beam Printers and Small Office Multifunctionals (LBP and MF series) - 1.01MB

    MFPs for Office and for Production Printing (imageRUNNER, imageRUNNER ADVANCE, imagePRESS Series) - 754KB

    Network Cameras - 2.6MB

    MFD Hardening Guide - 2.03MB

    Network Scanners (imageFORMULA Series) - 602KB

    Canon imageRUNNER Security Matrix - 545KB

    Canon Device Security Overview - 1.98MB

    imageRUNNER ADAVANCE and imageRUNNER ADVANCE DX Security Whitepaper - 4.49MB

    SIEM_spec (imageRUNNER ADVANCE) - 84KB




    ColorWave and PlotWave SMARTshield Security White Paper - 1.01MB



Certification

  • Canon places the highest focus on Information Security safeguarding the confidentiality, integrity and availability of written, spoken and electronic information, to ensure the following is assured at all times:

    • Confidentiality - ensuring that information is accessible only to those authorised to have access
    • Integrity - safeguarding the accuracy and completeness of information and processing methods
    • Availability - ensuring that authorised users have access to information when needed

    ISO 27001 certification demonstrates that Canon Europe has systems in place to protect corporate information and data, whether this is online or offline. By holding ISO 27001, Canon Europe can confirm that it’s security processes from development to delivery have been externally assessed and have been 3rd party certified to an internationally recognised standard.


    ISO 27001 Information Security Certificate Canon Europe has received ISO 27001 certification for its information security management system, reassuring customers that we adhere to world class standards. It covers all aspects of information security from risk and audit management to product security and incident management.


    Our Information Security Management System (ISMS) covers the following areas:

    • security policy
    • organisation of information security
    • asset management
    • human resources security
    • physical and environmental security
    • communications and operations management
    • access control
    • information systems acquisition, development and maintenance
    • information security incident management
    • business continuity management
    • regulatory compliance

Product Vulnerability Disclosure

  • The Canon EMEA PSIRT (Product Security Incident Response Team) is part of the global Canon PSIRT organisation and is responsible for responding to vulnerabilities which are associated with products, systems, and services from Canon EMEA. We follow industry best practices to improve product security levels and to provide our customers with highly secure products.


    Canon EMEA PSIRT welcomes information related to any suspected product vulnerability, and we will handle the information in line with our Vulnerability Disclosure Policy.

Report a Product Vulnerability

If you are aware of a security issue relating to a Canon product, system, or service, we would like to hear from you.

  • If you believe you have discovered a security issue with a Canon product or have a security incident to report, you can contact the Canon EMEA Product Security Incident Response Team either by please email product-security@canon-europe.com, or through our Product Vulnerability Report Form. Please include a detailed summary of the security issue, the exact name of the product, software version and the nature of the issue. Please also include an email address and telephone number so we can contact you if we require more information.

  • Please note that this email address and form are is only for reporting product security issues vulnerabilities and not for general support issues. Please visit our Support pages for help with any other product issue.

IT System Security Disclosure Policy

As Canon we take security of our IT systems seriously and value the security community.  The disclosure of security weaknesses helps us ensure the security and privacy of our users by acting as a trusted partner. This policy explains the requirement and mechanism related to Canon EMEA IT System Vulnerability Disclosure that enables researchers to report security vulnerabilities in a safe and ethical manner to the Canon EMEA Information Security team.

This Policy applies to everyone including internal Canon and external participants.

  • The Canon EMEA Information Security Team is committed to protecting Canon’s customers and employees, as part of this commitment, we invite security researchers to help protect Canon by proactively reporting security vulnerabilities and weaknesses. You can report the details of your finding(s) at: appsec@canon-europe.com


    Domains in scope

    This is the list of domains which are included as part of the Canon Vulnerability Disclosure Policy.


    *.canon-europe.com

    *.canon.nl

    *.canon.co.uk

    *.canon.com.tr

    *.canon.com.de

    *.canon.com.sa

    *.canon.com.ae

    *.canon.com.jp

    *.canon.com.ca

    *.canon.no

    *.canon.es

    *.canon.se

    *.canon.pl

    *.canon.be

    *.canon.pt

    *.canon.it

    *.canon.dk

    *.canon.ch

    *.canon.fi

    *.canon.at

    *.canon.fr

    *.canon.ie

    *.uaestore.canon.me.com

     

  • You can report weaknesses to us by email: appsec@canon-europe.com. Please state concisely in your email what weakness(es) you have found as explicit and detailed as possible and provide any evidence you might have, keeping in mind that the message will be reviewed by Canon Security specialists. Particularly include the following in your e-mail:

    • The type of vulnerability
    • The step by step instructions on how to reproduce the vulnerability
    • Approach you undertook
    • The entire URL
    • Objects (as filters or entry fields) possibly involved
    • Screen prints are highly appreciated
    • Provide your IP address in the Weakness Report. This will be kept private for tracking your testing activities and to review the logs from our side

    We will not accept automated software scanners output.


    What will not be accepted:
    • Volumetric/Denial of Service vulnerabilities (i.e. simply overwhelming our service with a high volume of requests)
    • TLS configuration weaknesses (e.g. "weak" cipher suite support, TLS1.0 support, sweet32 etc.)
    • Issues surrounding the verification of email addresses used to create user accounts related to myid.canon
    • "Self" XSS
    • Mixed Content Scripts on www.canon.*
    • Insecure Cookies on www.canon.*
    • CSRF and CRLF attacks where the resulting impact is minimum
    • HTTP Host Header XSS without working proof-of-concept
    • Incomplete/Missing SPF/DMARC/DKIM
    • Social Engineering attacks
    • Security Bugs in third party websites that integrate with Canon
    • Network data enumeration techniques (e.g. banner grabbing, existence of publicly available server diagnostic pages)
    • Reports indicating that our services do not fully align with "best practice"

  • Canon Information security experts will investigate your report and will contact you within 5 working days. 

    Your privacy

    We will only use your personal details to take action based on your report. We will not share your personal details with others without your express permission.

  • Potentially Illegal Actions

    If you discover a weakness and investigate it, you might perform actions that are punishable by law. If you follow the rules and principles below for reporting weaknesses in our IT systems, we will not report your offence to the authorities and will not submit a claim.

    It is important for you to know, however, that the public prosecutor’s office – not CANON– may decide whether or not you will be prosecuted, even if we have not reported your offence to the authorities. Meaning we cannot guarantee that you will not be prosecuted if you commit a punishable offence when investigating a weakness.

    The National Cyber Security Centre of the Ministry of Security and Justice has created guidelines for reporting weaknesses in IT systems. Our rules are based on these guidelines. (https://english.ncsc.nl/)


    General Principles

    Take responsibility and act with extreme care and caution. When investigating the matter, only use methods or techniques that are necessary in order to find or demonstrate the weaknesses.

    • Do not use weaknesses you discover for purposes other than your own specific investigation.
    • Do not use social engineering to gain access to a system.
    • Do not install any back doors – not even to demonstrate the vulnerability of a system. Back doors will weaken the system’s security.
    • Do not alter or delete any information in the system. If you need to copy information for your investigation, never copy more than you need. If one record is sufficient, do not go any further.
    • Do not alter the system in any way.
    • Only infiltrate a system if absolutely necessary. If you do manage to infiltrate a system, do not share access with others.
    • Do not use brute force techniques, such as repeatedly entering passwords, to gain access to systems.
    • Do not use Denial of Service (DoS) type of attacks to gain access

  • Will I receive a reward for my investigation?

    No, you are not entitled to any compensation.

    Am I allowed to publicize the weaknesses I find and my investigation?

    Never publicize weaknesses in Canon IT systems or your investigation without consulting us first via the email: appsec@canon-europe.com. We can work together to prevent criminals from abusing your information. Consult with our Information Security team and we can work together towards publication.

    Can I report a weakness anonymously?

    Yes, you can. You do not have to mention your name and contact details when you report a weakness. Please realize, however, that we will be unable to consult with you about follow-up measures, e.g. what we do about your report or further collaboration.

    What shouldn’t I use this email address for?

    The email: appsec@canon-europe.com is not intended for the following:

    • To submit complaints about Canon products or services
    • To submit questions or complaints about the availability of Canon websites.
    • To report fraud or suspicion of fraud
    • To report phony emails or phishing emails
    • To report viruses