Cannon Printer Vulnerability Let Attackers Execute Arbitrary Code
Canon has issued a critical security advisory regarding a severe vulnerability detected in several of its printer drivers that could allow attackers to execute arbitrary code on affected systems.
The flaw, identified as CVE-2025-1268, carries a high-severity CVSS base score of 9.4, indicating significant security implications for users of affected Canon products.
Critical Out-of-Bounds Vulnerability Details
Security researchers have identified an out-of-bounds vulnerability specifically affecting the EMF Recode processing functionality in multiple Canon Generic Plus printer drivers.
This vulnerability could potentially enable malicious actors to execute arbitrary code when print jobs are processed through a compromised application.
The critical nature of this flaw is reflected in its CVSS score of 9.4, placing it in the “Critical” severity category that demands immediate attention from system administrators and users alike.
Additionally, the flaw is particularly concerning as it requires no privileges, user interaction, or special access conditions to exploit. This classification indicates that remote attackers could potentially leverage the vulnerability with relatively low complexity.
The vulnerability might not only disrupt printing operations but could potentially serve as an entry point for more sophisticated attacks, allowing unauthorized code execution that could compromise system integrity and data security.
Canon has credited the Microsoft Offensive Research and Security Engineering Team (MORSE) for responsibly reporting this vulnerability, specifically acknowledging researcher Robert Ord for his contribution to identifying CVE-2025-1268.
The summary of the vulnerability is given below:
Risk Factors | Details |
Affected Products | – Generic Plus PCL6 Printer Driver (V3.12 and earlier)- Generic Plus UFR II Printer Driver (V3.12 and earlier)- Generic Plus LIPS4 Printer Driver (V3.12 and earlier)- Generic Plus LIPSLX Printer Driver (V3.12 and earlier)- Generic Plus PS Printer Driver (V3.12 and earlier) |
Impact | Arbitrary code execution or disrupt printing operations. |
Exploit Prerequisites | No privileges, user interaction, or special access conditions required; remotely exploitable. |
CVSS 3.1 Score | 9.4 (Critical) |
Affected Printer Drivers
Canon has confirmed that the vulnerability impacts the following printer driver versions:
- Generic Plus PCL6 Printer Driver – V3.12 and earlier
- Generic Plus UFR II Printer Driver – V3.12 and earlier
- Generic Plus LIPS4 Printer Driver – V3.12 and earlier
- Generic Plus LIPSLX Printer Driver – V3.12 and earlier
- Generic Plus PS Printer Driver – V3.12 and earlier
These drivers are commonly used across a wide range of Canon’s production printers, office/small office multifunction printers, and laser printers, potentially affecting thousands of organizations and individual users worldwide.
Canon has developed updated printer drivers to address this security issue. The company strongly advises all users to install the latest printer driver versions available through their local Canon sales representatives’ websites.
Users should prioritize this update to mitigate the risk of potential exploits targeting this vulnerability.
For comprehensive protection, IT administrators should consider implementing additional security controls, such as network segmentation for print servers and enhanced monitoring for suspicious printing activities.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Source link