Canon warns of Wi
Canon is warning users of home, office, and large format inkjet printers that their Wi-Fi connection settings stored in the devices' memories are not wiped, as they should, during initialization, allowing others to gain access to the data.
This flaw could introduce a security and privacy risk for impacted users if the printer memory is extracted by repair technicians, temporary users, or future buyers of the devices, allowing them to get the connection details for your Wi-FI network.
The specific information stored in a Canon printer varies depending on the model and configuration but generally includes the network SSID, the password, network type (WPA3, WEP, etc.), assigned IP address, MAC address, and network profile.
The exposure of this sensitive Wi-Fi connection information could help a malicious third-party gain unauthorized network access to a Canon printer user's network that the printer was connected to.
From there, the attacker can access shared resources, steal data, or launch other privacy-invading attacks leveraging additional vulnerabilities.
The list of Canon printers impacted by this issue is too extensive to include, comprising 196 inkjet, business inkjet, and large-format inject printer models from the E, G, GX, iB, iP, MB, MG, MX, PRO, TR, TS, and XK series.
The vendor has published a separate document to help users check if the data retention problem impacts their printer models.
Canon suggests owners of impacted printers first wipe their Wi-FI settings before a third party has access to the printer, such as when you are repairing the device or giving/selling it to another person.
The security advisory provides the following instructions on wiping Wi-FI settings:
For models that do not have the 'Reset all' function in the settings menu, users are advised to follow these steps instead:
If these instructions are not applicable to your printer model, Canon recommends referring to the operation manual that came with your device.
Another good security precaution would be to keep printers on networks isolated from valuable assets so that attackers won't be able to access important devices even if that network is compromised.
Finally, apply the available firmware updates for your printer model, and turn off services such as cloud printing or remote management interfaces if they're not needed.
Google: Android patch gap makes n-days as dangerous as zero-days
Android July security updates fix three actively exploited bugs
Over 130,000 solar energy monitoring systems exposed online
Snappy: A tool to detect rogue WiFi access points on open networks
FBI, CISA, and NSA reveal top exploited vulnerabilities of 2022