How to protect against WPA2 vulnerability (KRACKs) - Inkjet printers, inkjet multi-function printers with Wi-Fi feature - Canon Singapore

08 Dec 2017

    How to protect against WPA2 vulnerability (KRACKs) - Inkjet printers, inkjet multi-function printers with Wi-Fi feature


    Thank you for using Canon products.

    With the recent disclosure of WPA2 Vulnerability (KRACKs), we would like to provide information on proper safeguards to mitigate risks associated with this vulnerability when using Canon products.

    Supplementary Information on KRACKs:
    A vulnerability known as KRACKs in the standard wireless LAN (Wi-Fi) encryption protocol WPA2 has been made public recently. This vulnerability allows an attacker to intentionally intercept the wireless transmission between the client (terminal equipped with Wi-Fi functionality) and the access point (the router etc.) to perform potentially malicious activity. For that reason, this vulnerability cannot be exploited by anyone outside the range of the Wi-Fi signal or by anyone in a remote location using the internet as an intermediary.

    Affected Products:
    All inkjet printers, inkjet multi-function printers with Wi-Fi feature (standard or optional). Note: The following service are not affected by KRACKs vulnerability as the communication is encrypted.

    • PIXMA / MAXIFY Cloud Link
    • Google Cloud Print
    • Extended survey program


    Workaround:

    • Use wired connection (e.g. USB cable or Ethernet cable)
    • Use Wireless Direct (e.g. Print without using wireless LAN router)

    Please refer to the product's User's Guide for detailed setting change procedures.

    We would also recommend you to take measures against the vulnerability of the connected devices including PCs and smart phones.

    Contact information for Inquiries:
    Please contact your nearest service centre if you have any queries.