CVE-2018-11711

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to bypass authentication on Canon MF210 and MF220 multifunction printers by accessing /portal_top.html without knowing the System Manager PIN. Attackers gain full administrative control of affected devices. Only devices with default settings are vulnerable according to the vendor.

💻 Affected Systems

Products:
  • Canon MF210 Series
  • Canon MF220 Series
Versions: All versions with default configuration
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vendor states vulnerability only occurs when customers keep default settings without implementing recommended security measures.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attackers to intercept print jobs, modify device settings, install malicious firmware, or use the device as a network pivot point.

🟠

Likely Case

Unauthorized access to device configuration, potential data exfiltration from scanned documents or print jobs, and device misuse.

🟢

If Mitigated

No impact if proper security configurations are implemented as recommended in vendor documentation.

🌐 Internet-Facing: HIGH - Directly accessible web interfaces with default credentials are highly vulnerable to remote exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to /portal_top.html bypasses authentication. Multiple public exploit scripts available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch. Follow vendor's security best practices: 1. Change default System Manager PIN 2. Configure proper authentication settings 3. Restrict network access to web interface

🔧 Temporary Workarounds

Change Default Authentication Settings

all

Configure strong System Manager PIN and enable proper authentication mechanisms

Access device web interface > System Settings > Security > Change System Manager PIN

Network Segmentation

linux

Restrict access to printer web interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Disable web interface entirely if not needed for operations
  • Place printers on isolated VLAN with strict access controls

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[printer-ip]/portal_top.html without authentication. If you gain access to administrative functions, device is vulnerable.

Check Version:

Check device information page in web interface or printed configuration page

Verify Fix Applied:

Verify that accessing /portal_top.html without proper authentication returns an error or redirects to login page.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /portal_top.html
  • Multiple failed login attempts followed by successful /portal_top.html access
  • Administrative configuration changes from unexpected IP addresses

Network Indicators:

  • HTTP GET requests to /portal_top.html without preceding successful authentication
  • Unusual administrative traffic patterns to printer interfaces

SIEM Query:

source="printer_logs" AND (url="/portal_top.html" OR (event="auth_failure" AND subsequent_event="admin_access"))

🔗 References

📤 Share & Export