By Ryan Naraine
The vulnerability affects 20 Canon multifunction printers and could allow remote attackers to redirect traffic to other sites via the PORT command.
Researchers at Indiana University have raised an alert for a difficult-to-fix vulnerability affecting certain Canon Multifunction printers.
The flaw, which affects about 20 different Canon MFP models, could allow remote attackers to redirect traffic to other sites via the PORT command.
This issue is known as FTP bounce and is related to an old issue in FTP servers that lets remote attacker to connect to arbitrary ports on machines other than the FTP client.
According to the Indiana University advisory, the following Canon products are affected:
Canon has acknowledged the issue in an alert (PDF) that warns that an attacker may be able to scan networks that are not otherwise accessible. "An attacker may also be able to conceal the true origin of a port scanning attempt," Canon said, noting, however, that information in the network host cannot be obtained via the affected printers.
Nate Johnson, the lead security engineer at Indiana University who reported the issue to Canon, said the available firmware updates that fix the vulnerability "are not user-installable."
"[Patching this] requires a service-technician call from a local Canon Authorized Service Dealer," Johnson said.
As a temporary mitigation, Johnson recommends:
Disable FTP printing:
Protect FTP printing with username/password credentials:
"Additionally, best practices suggest that access controls and network firewall policies be put into place to only allow connections from trusted machines and networks," Johnson said.
..........................................................................................................
This article was originally published from eWeek and can be found at their site. OfficeProductNews.net does not hold the copyright of this article.