Overview:
Microsoft Windows systems are affected if the print spooler service is enabled and inbound remote printing is enabled. In addition, an attack must involve an authenticated user calling RpcAddPrinterDriverEx(). The threat vector is SMB. At this time, the attacker will need the username / password of an existing user on the attacked system. Then attacker would execute the DLL remotely.
These Vulnerabilities are currently awaiting updated analysis and represents our best knowledge as of the most recent revision. As a result, the content is subject to change as further analysis is performed and the results are updated.
Canon Medical Systems Corporation continues to investigate the applicability of this vulnerability to Medical Imaging Devices manufactured by Canon Medical Systems Corporation.
REFERENCE:
MITRE CVE-2021-34527
This vulnerability is applicable to Microsoft Windows systems.
Possible Affected Canon Medical Systems Products:
A) | Windows 10 based systems | |
The security measures have been taken for these Products with a security manual. By properly setting the built-in Host Firewall according to the security manual, it will not be affected by the vulnerability. This is accomplished by blocking Port 445/135/139 for inbound access. | ||
B) | Other Windows based systems (Windows 7 etc.) | |
These Products do not have a security manual. | ||
B-1) | Products with a built-in Host Firewall set (CT security option installed, MRI device, UL device, VL devices) | |
Not affected by the vulnerability. | ||
B-2) | Other Products | |
It is affected by the vulnerability. |
UL | AI V4.0 | 2021/8/31 |
CUS-VSV7 V4.0 | 2021/8/31 | |
MRI | V6.0SP1010 | 2021/9/15 |
CT | V10.4 | 2021/10/15 |
© CANON MEDICAL SYSTEMS CORPORATION
© CANON MEDICAL SYSTEMS CORPORATION
The site you see is the Canon Medical Global website. If you choose region / language, we will link to each regional site.