ID

VAR-202201-1352


CVE

CVE-2021-20877


TITLE

Canon Multiple product cross-site scripting vulnerabilities

Trust: 0.6

sources: CNNVD: CNNVD-202201-1697

DESCRIPTION

Cross-site scripting vulnerability in Canon laser printers and small office multifunctional printers (LBP162L/LBP162, MF4890dw, MF269dw/MF265dw/MF264dw/MF262dw, MF249dw/MF245dw/MF244dw/MF242dw/MF232w, and MF229dw/MF224dw/MF222dw sold in Japan, imageCLASS MF Series (MF113W/MF212W/MF217W/MF227DW/MF229DW, MF232W/MF244DW/MF247DW/MF249DW, MF264DW/MF267DW/MF269DW/MF269DW VP, and MF4570DN/MF4570DW/MF4770N/MF4880DW/MF4890DW) and imageCLASS LBP Series (LBP113W/LBP151DW/LBP162DW ) sold in the US, and iSENSYS (LBP162DW, LBP113W, LBP151DW, MF269dw, MF267dw, MF264dw, MF113w, MF249dw, MF247dw, MF244dw, MF237w, MF232w, MF229dw, MF217w, MF212w, MF4780w, and MF4890dw) and imageRUNNER (2206IF, 2204N, and 2204F) sold in Europe) allows remote attackers to inject an arbitrary script via unspecified vectors.

Trust: 1.0

sources: NVD: CVE-2021-20877

AFFECTED PRODUCTS

vendor:canonmodel:mf4880dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf217wscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf113wscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf247dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:lbp151dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf232wscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf224dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:2206ifscope:eqversion: -

Trust: 1.0

vendor:canonmodel:lbp162scope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf237wscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf4780wscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf229dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf242dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf262dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:lbp162dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf244dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf269dw vpscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf245dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf4890dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf222dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf265dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf267dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf227dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf212wscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf269dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:2204nscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf4570dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf264dwscope:eqversion: -

Trust: 1.0

vendor:canonmodel:lbp113wscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf4570dnscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf4770nscope:eqversion: -

Trust: 1.0

vendor:canonmodel:lbp162lscope:eqversion: -

Trust: 1.0

vendor:canonmodel:2204fscope:eqversion: -

Trust: 1.0

vendor:canonmodel:mf249dwscope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2021-20877

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-20877
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202201-1697
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2021-20877
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

nvd@nist.gov: CVE-2021-20877
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.7
impactScore: 2.7
version: 3.1

Trust: 1.0

sources: CNNVD: CNNVD-202201-1697 // NVD: CVE-2021-20877

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.0

sources: NVD: CVE-2021-20877

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202201-1697

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202201-1697

PATCH

title:Canon Repair measures for cross-site scripting vulnerabilities in multiple productsurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=182337

Trust: 0.6

sources: CNNVD: CNNVD-202201-1697

EXTERNAL IDS

db:NVDid:CVE-2021-20877

Trust: 1.6

db:JVNid:JVN64806328

Trust: 1.6

db:CS-HELPid:SB2022011917

Trust: 0.6

db:JVNDBid:JVNDB-2022-000001

Trust: 0.6

db:CNNVDid:CNNVD-202201-1697

Trust: 0.6

sources: CNNVD: CNNVD-202201-1697 // NVD: CVE-2021-20877

REFERENCES

url:https://cweb.canon.jp/e-support/info/211221xss.html

Trust: 1.6

url:https://www.usa.canon.com/internet/portal/us/home/support/product-advisories/detail/service-notice-canon-laser-printer-and-small-office-multifunctional-printer-related-to-cross-site-scripting

Trust: 1.6

url:https://jvn.jp/en/jp/jvn64806328/index.html

Trust: 1.6

url:https://jvn.jp/jp/jvn64806328/index.html

Trust: 1.6

url:https://www.canon-europe.com/support/product-security-latest-news/

Trust: 1.6

url:https://jvndb.jvn.jp/en/contents/2022/jvndb-2022-000001.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011917

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-20877

Trust: 0.6

sources: CNNVD: CNNVD-202201-1697 // NVD: CVE-2021-20877

SOURCES

db:CNNVDid:CNNVD-202201-1697
db:NVDid:CVE-2021-20877

LAST UPDATE DATE

2024-08-14T13:53:40.760000+00:00


SOURCES UPDATE DATE

db:CNNVDid:CNNVD-202201-1697date:2022-03-10T00:00:00
db:NVDid:CVE-2021-20877date:2022-02-14T21:07:30.460

SOURCES RELEASE DATE

db:CNNVDid:CNNVD-202201-1697date:2022-01-19T00:00:00
db:NVDid:CVE-2021-20877date:2022-02-08T11:15:07.663