Computer Hardware News and Updates: Vulnerabilities, Releases, and More

2024-02-14 08:09:53

Computer field HKEPC Hardware » News Center » HK$799!! The fun and beautiful ANTEC C8 White column-less panoramic chassis MSI is giving away a limited edition “Long Zai Calendar Building Block” (free shipping) to thank HKEPC readers for their support. Canon Printer has 7 serious vulnerabilities. Hacker remote control is used as a DDoS attack on Windows 11 24H2. The requirement is raised to support the POPCNT command, otherwise the Core i9-14900KS cannot be started. The burn-in test is exposed!! OCCT confirms that the 6.2GHz Turbo Max, 150W TDPNVIDIA Chat with RTX chatbot can be run locally for free. Support RTX 30/40 graphics card GitHub OpenGFW open source system simulates China’s “Great Firewall” to make overseas Chinese feel at home Win 11 24H2 adds Super Resolution technology to improve game and video resolution through AI computing units SAMSUNG SSD tool has serious problems Please update to Magician 8.0.1 version immediately due to the vulnerability ASROCK updates Intel 600/700 BIOS 14th generation Non-K CPU multi-core performance increased by 10% The German court ruled that Intel infringed on the R2 patent. Some Intel CPU models are not allowed to sell Huawei Vision headset in Germany It is expected to launch its own research and development chip SONY 4K OLED in the middle of the year, weighing only 350g. Energizer launches P28K, a special-purpose smartphone with a rugged and durable battery that can last for 3 months. LastPass was launched on the App Store and passed Apple’s strict review. EPIC gave away “Heartbeat Literature Club” for free. Plus!》 4 heroines, more than 100 hidden pictures waiting for you to unlock. Don’t touch Windows 11 build 26052 preview version. There will be a green screen when playing. Rolling back to the old version will cause data loss. ROG OLED display comes with 2 years of branding warranty. MSI will follow up and add more. One more year of OLED 3-year branding warranty NVIDIA releases 551.46 Hotfix driver to resolve intermittent “micro-stuck” bug!! CableMod was ordered by the US government to recall the 12VHPWR corner adapter due to fire and burn risks New AMD Ryzen 7 5700 processor Game performance actually lost to Ryzen 5 5600. Microsoft launches PC Manager system cleaning tool with functions similar to CCleaner. It can clean system junk files and registry. 3 million smart toothbrushes were infected with Trojans and were used by hackers to carry out DDoS attacks on Swiss websites.

2024-02-14

Canon Printer has 7 serious vulnerabilities
Remotely controlled by hackers and used for DDoS attacks

Text: Editorial Department/News Center

[9.8/10ExtremelyHighRisk⚠️]Your Printer may have been controlled by hackers and is undergoing a DDoS attack!! Canon admitted on the 7th that there are 7 serious security vulnerabilities in some models of its i-Sensys series Printers, and the CVSS vulnerability score is as high as 9.8/ 10. Allows hackers to remotely invade and execute arbitrary code, force the device to crash, and launch denial of service attacks.

According to Canon’s notification, affected Printer models include Canon i-Sensys MF750 and LBP670 color laser series, as well as i-Sensys X series C1333i, C1333iF, and X C1333P. All versions of Firmware version 3.07 or below are affected. Vulnerability identification code For CVE-2023-6229, CVE-2023-6230, CVE-2023-6231, CVE-2023-6232, CVE-2023-6233, CVE-2023-6234 and CVE-2024-0244

Canon warns that affected printers are considered vulnerable to attacks that might allow hackers to remotely execute arbitrary code, force the device to crash, and launch denial-of-service attacks. Most vulnerabilities are also marked as “very high risk” according to the Common Vulnerability Scoring System (CVSS), with a severity rating of 9.8/10.

If you are using the above-mentioned Canon Printer, the official update firmware has been released, please download and patch the vulnerability as soon as possible.

source:

‘);
var inner = jQuery(”);

jQuery(orgEle).wrap(wrap);
wrap = jQuery(orgEle).parent();

var dts = jQuery(orgEle).find(‘dt’);
var dds = jQuery(orgEle).find(‘dd’);

var select_1 = jQuery(”);
var select_2 = jQuery(”);

var optionStr = jQuery(orgEle).attr(‘data-options’);
var options = {
“selected_1”: 0,
“selected_2″: 1
};

if(typeof optionStr != ‘undefined’){
var tmpOptions = optionStr.split(‘&’);

for (var i = 0; i = 1 ? parseInt(t[1]) – 1 : options.selected_1;
break;
case ‘select-2’:
options.selected_2 = parseInt(t[1]) >= 1 ? parseInt(t[1]) – 1 : options.selected_2;
break
}
}
}

}

var src1 = jQuery(dds[options.selected_1]).find(‘img’).attr(‘data-src’);
// console.log(src1);
src1 = typeof src1 != ‘undefined’ && src1 != ” ? src1 : jQuery(dds[options.selected_1]).find(‘img’).attr(‘src’);

var src2 = jQuery(dds[options.selected_2]).find(‘img’).attr(‘data-src’);
// console.log(src2);
src2 = typeof src2 != ‘undefined’ && src2 != ” ? src2 : jQuery(dds[options.selected_2]).find(‘img’).attr(‘src’);

// console.log(options);
// console.log(dts);
// console.log(dds);
// console.log(src1);
// console.log(src2);

inner.append(
jQuery(”).attr(‘src’, src1)
)

inner.append(
jQuery(”).attr(‘src’, src2)
)

for(var i = 0 ; i ‘).text( jQuery(dts[i]).text() ).attr(‘data-index’, i).attr(‘selected’, i == (options.selected_1) ) );
select_2.append( jQuery(”).text( jQuery(dts[i]).text() ).attr(‘data-index’, i).attr(‘selected’, i == (options.selected_2) ) );

}

select_1.change(imageCompareSelectChange);
select_2.change(imageCompareSelectChange);

wrap.append(
jQuery(”)
.append(select_1)
.append(select_2)
.append(jQuery(”))
);

wrap.append(inner);

new ImageCompare(inner[0]).mount();
}
catch(e){
console.log(e);
}
});
});

includeCSSfile(”
1707900420
#Canon #Printer #vulnerabilities #remotely #controlled #hackers #DDoS #attacks #Computer #Field #HKEPC #Hardware

Leave a Replay