ID

VAR-202011-0485


CVE

CVE-2020-16849


TITLE

Canon MF237w  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-013892

DESCRIPTION

An issue was discovered on Canon MF237w 06.07 devices. An "Improper Handling of Length Parameter Inconsistency" issue in the IPv4/ICMPv4 component, when handling a packet sent by an unauthenticated network attacker, may expose Sensitive Information. Canon MF237w Contains an unspecified vulnerability.Information may be obtained. i-SENSYS MF237w is a four-in-one multifunction laser printer suitable for small offices launched by Canon. There is an information disclosure vulnerability in i-SENSYS MF237w 06.07. An attacker could exploit this vulnerability to obtain sensitive information by sending a specially crafted packet

Trust: 2.16

sources: NVD: CVE-2020-16849 // JVNDB: JVNDB-2020-013892 // CNVD: CNVD-2022-06537

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-06537

AFFECTED PRODUCTS

vendor:canonmodel:mf244dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:lbp113wscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf269dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf237wscope:eqversion:06.07

Trust: 1.0

vendor:canonmodel:mf247dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:ir2202nscope:eqversion: -

Trust: 1.0

vendor:canonmodel:lbp151dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf4570dnscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf4580dnscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf217wscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf232wscope:eqversion: -

Trust: 1.0

vendor:canonmodel:ir2204nscope:eqversion: -

Trust: 1.0

vendor:canonmodel:ir2206ifscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf249dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf264dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf226dnscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf216nscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf229dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf4780wscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf4870dnscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf212wscope:eqversion: -

Trust: 1.0

vendor:canonmodel:ir2206nscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf4890dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:ir2204fscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf267dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf231scope:eqversion: -

Trust: 1.0

vendor:canonmodel:lbp162dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf113wscope:eqversion: -

Trust: 1.0

vendor:キヤノンmodel:mf217wscope: - version: -

Trust: 0.8

vendor:キヤノンmodel:mf216nscope: - version: -

Trust: 0.8

vendor:キヤノンmodel:mf231scope: - version: -

Trust: 0.8

vendor:キヤノンmodel:mf232wscope: - version: -

Trust: 0.8

vendor:キヤノンmodel:mf237wscope: - version: -

Trust: 0.8

vendor:キヤノンmodel:mf212wscope: - version: -

Trust: 0.8

vendor:キヤノンmodel:mf244dwscope: - version: -

Trust: 0.8

vendor:キヤノンmodel:mf229dwscope: - version: -

Trust: 0.8

vendor:キヤノンmodel:mf113wscope: - version: -

Trust: 0.8

vendor:キヤノンmodel:mf226dnscope: - version: -

Trust: 0.8

vendor:canonmodel:i-sensys mf237wscope:eqversion:6.07

Trust: 0.6

sources: CNVD: CNVD-2022-06537 // JVNDB: JVNDB-2020-013892 // NVD: CVE-2020-16849

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-16849
value: HIGH

Trust: 1.0

NVD: CVE-2020-16849
value: HIGH

Trust: 0.8

CNVD: CNVD-2022-06537
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202011-2072
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-16849
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2022-06537
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-16849
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2020-16849
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-06537 // JVNDB: JVNDB-2020-013892 // CNNVD: CNNVD-202011-2072 // NVD: CVE-2020-16849

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:Other (CWE-Other) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-013892 // NVD: CVE-2020-16849

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202011-2072

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202011-2072

PATCH

title:Security for Products Connected to a Networkurl:https://www.canon-europe.com/support/product-security/

Trust: 0.8

title:Patch for i-SENSYS MF237w Information Disclosure Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/316071

Trust: 0.6

title:Canon Mf237w Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=135876

Trust: 0.6

sources: CNVD: CNVD-2022-06537 // JVNDB: JVNDB-2020-013892 // CNNVD: CNNVD-202011-2072

EXTERNAL IDS

db:NVDid:CVE-2020-16849

Trust: 3.0

db:JVNDBid:JVNDB-2020-013892

Trust: 0.8

db:CNVDid:CNVD-2022-06537

Trust: 0.6

db:CNNVDid:CNNVD-202011-2072

Trust: 0.6

sources: CNVD: CNVD-2022-06537 // JVNDB: JVNDB-2020-013892 // CNNVD: CNNVD-202011-2072 // NVD: CVE-2020-16849

REFERENCES

url:https://blog.scadafence.com/vulnerability-report-cve-2020-16849

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-16849

Trust: 2.0

url:https://www.canon-europe.com/support/product-security/

Trust: 1.6

sources: CNVD: CNVD-2022-06537 // JVNDB: JVNDB-2020-013892 // CNNVD: CNNVD-202011-2072 // NVD: CVE-2020-16849

SOURCES

db:CNVDid:CNVD-2022-06537
db:JVNDBid:JVNDB-2020-013892
db:CNNVDid:CNNVD-202011-2072
db:NVDid:CVE-2020-16849

LAST UPDATE DATE

2024-11-23T22:33:15.803000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-06537date:2022-01-25T00:00:00
db:JVNDBid:JVNDB-2020-013892date:2021-07-15T08:00:00
db:CNNVDid:CNNVD-202011-2072date:2020-12-07T00:00:00
db:NVDid:CVE-2020-16849date:2024-11-21T05:07:15.857

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-06537date:2022-01-25T00:00:00
db:JVNDBid:JVNDB-2020-013892date:2021-07-15T00:00:00
db:CNNVDid:CNNVD-202011-2072date:2020-11-30T00:00:00
db:NVDid:CVE-2020-16849date:2020-11-30T22:15:10.777