Skip to content

Canon Firmware Security Updates Released For 11 Cameras

Security Flaw Canon Firmware

Already announced earlier, here is another batch of Canon firmware updates dealing with a security flaw in Canon’s Picture Transfer Protocol, the WiFi transfer protocol used on Canon cameras. More information about the security issue can be learned here.

Below you see all yet released firmware updates to fix the security flaw. All links point to the latest firmware.

ModelEstimated Firmware availability
EOS-1D X*1*2Version 1.2.1 is available for download
EOS-1D X Mark II*1*2                     Version 1.1.7 is available for download
EOS-1D C*1*2                        Version 1.4.2 is available for download
EOS 5D Mark III*1Version 1.3.6 is available for download
EOS 5D Mark IVVersion 1.2.1 is available for download
EOS 5DS*1Version 1.1.3 is available for download
EOS 5DS R*1       Version 1.1.3 is available for download
EOS 6D      Version 1.1.9 is available for download
EOS 6D Mark IIVersion 1.0.5 is available for download
EOS 7D Mark II*1Version 1.1.3 is available for download
EOS 70DVersion 1.1.3 is available for download
EOS 80D    Version 1.0.3 is available for download
EOS M10Tbd
EOS M100Tbd
EOS M3Tbd
EOS M5Tbd
EOS M50Version 1.0.3 is available for download
EOS M6Tbd
EOS M6 Mark IIVersion 1.0.1 is available for download
EOS RVersion 1.4.0 is available for download
EOS RPVersion 1.4.0 is available for download
EOS Rebel SL2Tbd
EOS Rebel SL3Version 1.0.2 is available for download
EOS Rebel T6Tbd
EOS Rebel T6iTbd
EOS Rebel T6sVersion 1.0.1 is available for download
EOS Rebel T7Tbd
EOS Rebel T7ITbd
PowerShot G5X Mark IITbd
PowerShot SX70 HSVersion 1.1.1 is available for download
PowerShot SX740 HS

*1These models require a WiFi adapter or a Wireless File Transmitter to support WiFi connectivity.
*2Ethernet connections can also permit these vulnerabilities.
Version 1.0.2 is available for download

Canon product advisory:

Thank you very much for using Canon products.

An international team of security researchers has drawn our attention to a vulnerability related to communications via the Picture Transfer Protocol (PTP), which is used by Canon digital cameras, as well as a vulnerability related to firmware updates.
(CVE-ID:CVE-2019-5994, CVE-2019-5995, CVE-2019-5998, CVE-2019-5999, CVE-2019-6000, CVE-2019-6001)

Due to these vulnerabilities, the potential exists for third-party attack on the camera if the camera is connected to a PC or mobile device that has been hijacked through an unsecured network.

At this point, there have been no confirmed cases of these vulnerabilities being exploited to cause harm, but in order to ensure that our customers can use our products securely, we would like to inform you of the following workarounds for this issue.

* Ensure the suitability of security-related settings of the devices connected to the camera, such as the PC, mobile device, and router being used.

* Do not connect the camera to a PC or mobile device that is being used in an unsecure network, such as in a free Wi-Fi environment.

* Do not connect the camera to a PC or mobile device that is potentially exposed to virus infections.

* Disable the camera’s network functions when they are not being used.

* Download the official firmware from Canon’s website when performing a camera firmware update.

Models Affected

These vulnerabilities affect the EOS-series digital SLR and mirrorless cameras PowerShot SX740 HS, PowerShot SX70 HS, PowerShot G5X Mark II.

Firmware Update

There is an increased use of PCs and mobile devices in an unsecure (free Wi-Fi) network environment where customers are not aware of the network security. As it has become prevalent to transfer images from a camera to a mobile device via Wi-Fi connection, we will implement firmware updates for the following models that are equipped with the Wi-Fi function.

Back To Top

Notice

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. If you want to know more or withdraw your consent to all or some of the cookies, please refer to the cookie policy.
By closing this banner you agree to the use of cookies.