CVE-2026-22665
Canon · prompts
A high-severity vulnerability has been identified in the "prompts" component as utilized within Canon products, potentially affecting device security.
Executive summary
Canon products utilizing the "prompts" component are affected by a high-risk vulnerability that could lead to unauthorized access or device compromise.
Vulnerability
This vulnerability involves the "prompts" software component within the Canon ecosystem. A CVSS score of 8.1 suggests that the flaw allows for significant exploitation, likely through improper handling of interactive user prompts or input fields within the device's software interface.
Business impact
An attacker could potentially exploit this flaw to gain unauthorized access to Canon devices, leading to data exfiltration or the use of the device as a foothold within the corporate network. The High severity reflects the risk of compromising hardware that often handles sensitive document data.
Remediation
Immediate Action: Check the Canon support portal for firmware updates related to this CVE and apply them to all affected devices immediately.
Proactive Monitoring: Monitor network traffic from Canon devices for unusual outbound connections or attempts to access restricted network segments.
Compensating Controls: Place printing and imaging hardware on a segmented network with restricted access to the broader corporate environment.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Apply the primary firmware update immediately to mitigate the risk. Organizations should prioritize the security of networked peripherals like Canon devices, as they are often overlooked entry points for attackers.