CVE-2026-22665

Canon · prompts

A high-severity vulnerability has been identified in the "prompts" component as utilized within Canon products, potentially affecting device security.

Executive summary

Canon products utilizing the "prompts" component are affected by a high-risk vulnerability that could lead to unauthorized access or device compromise.

Vulnerability

This vulnerability involves the "prompts" software component within the Canon ecosystem. A CVSS score of 8.1 suggests that the flaw allows for significant exploitation, likely through improper handling of interactive user prompts or input fields within the device's software interface.

Business impact

An attacker could potentially exploit this flaw to gain unauthorized access to Canon devices, leading to data exfiltration or the use of the device as a foothold within the corporate network. The High severity reflects the risk of compromising hardware that often handles sensitive document data.

Remediation

Immediate Action: Check the Canon support portal for firmware updates related to this CVE and apply them to all affected devices immediately.

Proactive Monitoring: Monitor network traffic from Canon devices for unusual outbound connections or attempts to access restricted network segments.

Compensating Controls: Place printing and imaging hardware on a segmented network with restricted access to the broader corporate environment.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Apply the primary firmware update immediately to mitigate the risk. Organizations should prioritize the security of networked peripherals like Canon devices, as they are often overlooked entry points for attackers.