{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-0852","assignerOrgId":"f98c90f0-e9bd-4fa7-911b-51993f3571fd","assignerShortName":"Canon","dateUpdated":"2025-02-10T21:00:00.954Z","dateReserved":"2023-02-16T00:00:00.000Z","datePublished":"2023-05-11T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"f98c90f0-e9bd-4fa7-911b-51993f3571fd","shortName":"Canon","dateUpdated":"2023-05-11T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Buffer overflow in the Address Book of Mobile Device function of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe."}],"affected":[{"vendor":"Canon Inc.","product":"Canon Office/Small Office Multifunction Printers and Laser Printers","versions":[{"version":"Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.","status":"affected"}]}],"references":[{"url":"https://www.canon-europe.com/support/product-security-latest-news/"},{"url":"https://psirt.canon/advisory-information/cp2023-001/"},{"url":"https://canon.jp/support/support-info/230414vulnerability-response"},{"url":"https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediation-Against-Buffer-Overflow"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121: Stack-based Buffer Overflow","cweId":"CWE-121"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:24:34.570Z"},"title":"CVE Program Container","references":[{"url":"https://www.canon-europe.com/support/product-security-latest-news/","tags":["x_transferred"]},{"url":"https://psirt.canon/advisory-information/cp2023-001/","tags":["x_transferred"]},{"url":"https://canon.jp/support/support-info/230414vulnerability-response","tags":["x_transferred"]},{"url":"https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediation-Against-Buffer-Overflow","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-10T20:59:49.725936Z","id":"CVE-2023-0852","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-10T21:00:00.954Z"}}]}}