CVE-2022-24673

high-risk
Published 2023-03-28

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Canon imageCLASS MF644Cdw 10.02 printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the SLP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15845.

Do I need to act?

~
7.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (20)

D1620 Firmware
D1650 Firmware
D1520 Firmware
D1550 Firmware
Mf1127C Firmware
Mf1238 Firmware
Mf1238 Ii Firmware
Mf1643I Ii Firmware
Mf1643If Ii Firmware
Mf414Dw Firmware
Mf416Dw Firmware
Mf419Dw Firmware
Mf515Dw Firmware
Mf424Dw Firmware
Mf426Dw Firmware
Mf429Dw Firmware
Mf525Dw Firmware
Mf445Dw Firmware
Mf448Dw Firmware
Mf449Dw Firmware

Affected Vendors

69
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 9/34 · Low
Exposure 28/34 · Critical