Attacker Value
Unknown
0
CVE-2008-0303
0
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Attacker Value
Unknown
(0 users assessed)Exploitability
Unknown
(0 users assessed)User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0
MITRE ATT&CK
Log in to add MITRE ATT&CK tag
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
MITRE ATT&CK
Select the MITRE ATT&CK Tactics that apply to this CVE
Collection
Select any Techniques used:
Command and Control
Select any Techniques used:
Credential Access
Select any Techniques used:
Defense Evasion
Select any Techniques used:
Discovery
Select any Techniques used:
Execution
Select any Techniques used:
Exfiltration
Select any Techniques used:
Impact
Select any Techniques used:
Initial Access
Select any Techniques used:
Lateral Movement
Select any Techniques used:
Persistence
Select any Techniques used:
Privilege Escalation
Select any Techniques used:
Topic Tags
Select the tags that apply to this CVE (Assessment added tags are disabled and cannot be removed)
What makes this of high-value to an attacker?
What makes this of low-value to an attacker?
Description
The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
Data provided by the National Vulnerability Database (NVD)
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown
General Information
Offensive Application
Unknown
Utility Class
Unknown
Ports
Unknown
OS
Unknown
Vulnerable Versions
n/a
Prerequisites
Unknown
Discovered By
Unknown
PoC Author
Unknown
Metasploit Module
Unknown
Reporter
Unknown
Vendors
Products
- i-sensys lbp3360,
- i-sensys lbp3460,
- i-sensys lbp5360,
- imagepress c1,
- imagerunner 105plus,
- imagerunner 2230,
- imagerunner 2270,
- imagerunner 2570c,
- imagerunner 2570ci,
- imagerunner 2620,
- imagerunner 2870,
- imagerunner 3025,
- imagerunner 3025n,
- imagerunner 3035,
- imagerunner 3035n,
- imagerunner 3045,
- imagerunner 3045n,
- imagerunner 3170c,
- imagerunner 3170ci,
- imagerunner 3180c,
- imagerunner 3180ci,
- imagerunner 3530,
- imagerunner 3570,
- imagerunner 4570,
- imagerunner 5000i,
- imagerunner 5020,
- imagerunner 5055,
- imagerunner 5055n,
- imagerunner 5065,
- imagerunner 5065n,
- imagerunner 5075,
- imagerunner 5075n,
- imagerunner 5570,
- imagerunner 5800c,
- imagerunner 5800cn,
- imagerunner 6570,
- imagerunner 6800c,
- imagerunner 6800cn,
- imagerunner 6870,
- imagerunner 7086,
- imagerunner 7095,
- imagerunner 7095p,
- imagerunner 7105,
- imagerunner 8070,
- imagerunner 8500,
- imagerunner 85plus,
- imagerunner 9070,
- imagerunner c2380i,
- imagerunner c2620,
- imagerunner c2620n,
- imagerunner c2880,
- imagerunner c2880i,
- imagerunner c3200,
- imagerunner c3220,
- imagerunner c3220n,
- imagerunner c3380,
- imagerunner c3380i,
- imagerunner c4080i,
- imagerunner c4580i,
- imagerunner c5185i,
- imagerunner c5870,
- imagerunner c5870i,
- imagerunner c5880,
- imagerunner c5880i,
- imagerunner c6800,
- imagerunner c6870i,
- imagerunner c6880,
- imagerunner c6880i,
- imagerunner clc4040,
- imagerunner clc5151
References
Advisory
Miscellaneous
Additional Info
Authenticated
Unknown
Exploitable
Unknown
Reliability
Unknown
Stability
Unknown
Available Mitigations
Unknown
Shelf Life
Unknown
Userbase/Installbase
Unknown
Patch Effectiveness
Unknown
Rapid7
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: