Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:canon:mg3100_printer:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA808CB1-E232-45A7-8913-03DDD4D967AA", "vulnerable": true}, {"criteria": "cpe:2.3:h:canon:mg5300_printer:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A7BF24E-0FE5-41E6-B4AF-5CEC5ED0AB3E", "vulnerable": true}, {"criteria": "cpe:2.3:h:canon:mg6100_printer:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C007C65-9187-4593-B236-025831220B8C", "vulnerable": true}, {"criteria": "cpe:2.3:h:canon:mp340_printer:-:*:*:*:*:*:*:*", "matchCriteriaId": "F038B929-787C-4350-B1A4-F2E0F12969FE", "vulnerable": true}, {"criteria": "cpe:2.3:h:canon:mp495_printer:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A7687B9-537C-47CB-AA7B-DE57725B6E89", "vulnerable": true}, {"criteria": "cpe:2.3:h:canon:mx870_printer:-:*:*:*:*:*:*:*", "matchCriteriaId": "555BD45B-2B53-42BE-B76B-03205EADD821", "vulnerable": true}, {"criteria": "cpe:2.3:h:canon:mx890_printer:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD762566-16C3-4391-B3C4-A0247AA082AF", "vulnerable": true}, {"criteria": "cpe:2.3:h:canon:mx920_printer:-:*:*:*:*:*:*:*", "matchCriteriaId": "C74EB1F2-29DA-4835-B2D0-AB96CB1B4FB2", "vulnerable": true}, {"criteria": "cpe:2.3:h:canon:mx922_printer:-:*:*:*:*:*:*:*", "matchCriteriaId": "08F6F82C-6EF6-40E6-A6C5-D2B4952B02FC", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "English/pages_MacUS/wls_set_content.html on the Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers shows the Wi-Fi PSK passphrase in cleartext, which allows physically proximate attackers to obtain sensitive information by reading the screen of an unattended workstation."}, {"lang": "es", "value": "English/pages_MacUS/wls_set_content.html en impresoras Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, y MX922 muestra la contrase\u00f1a de paso (passphrase) en texto plano, lo que permite a atacantes f\u00edsicamente pr\u00f3ximos obtener informaci\u00f3n sensible mediante la lectura de la pantalla de una estaci\u00f3n de trabajo."}], "id": "CVE-2013-4614", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2013-06-21T21:55:01.033", "references": [{"source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0146.html"}, {"source": "cve@mitre.org", "url": "http://www.mattandreko.com/2013/06/canon-y-u-no-security.html"}, {"source": "cve@mitre.org", "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/canon_wireless.rb"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0146.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mattandreko.com/2013/06/canon-y-u-no-security.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/canon_wireless.rb"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-255"}], "source": "nvd@nist.gov", "type": "Primary"}]}