A security vulnerability, tracked as CVE-2025-1268, has been found in certain Canon printer drivers, potentially allowing attackers to execute arbitrary code.
The flaw, categorized as an out-of-bounds vulnerability, affects printer drivers for office multifunction printers, small office printers, production printers, and laser printers.
Canon has acknowledged the issue and urged users to update their printer driver software promptly.
Details of the Vulnerability
The vulnerability lies in the EMF Recode processing of affected printer drivers, which mishandles certain operations and enables attackers to exploit the system by executing arbitrary code.
This type of attack can occur when the print job is processed by a malicious application. If exploited, the vulnerability may lead to compromising the confidentiality, integrity, and availability of the affected system.
The Common Vulnerability Scoring System (CVSS) v3.1 has rated this flaw with a Base Score of 9.4, indicating a severe risk level. The breakdown of the CVSS rating is as follows:
- Attack Vector (AV): Network
- Attack Complexity (AC): Low
- Privileges Required (PR): None
- User Interaction (UI): None
- Scope (S): Unchanged
- Confidentiality (C): High
- Integrity (I): High
- Availability (A): Low
This score highlights the ease with which the vulnerability can be exploited and the significant impact it could have on systems using the affected printer drivers.
Affected Printer Drivers
The vulnerability impacts the following Canon printer driver versions:
- Generic Plus PCL6 Printer Driver – V3.12 and earlier
- Generic Plus UFR II Printer Driver – V3.12 and earlier
- Generic Plus LIPS4 Printer Driver – V3.12 and earlier
- Generic Plus LIPSLX Printer Driver – V3.12 and earlier
- Generic Plus PS Printer Driver – V3.12 and earlier
These drivers are commonly installed on devices ranging from small office printers to production printing systems, meaning the scope of the issue could affect businesses globally.
Remediation and Mitigation
Canon has announced that updated printer drivers addressing this vulnerability will be made available through the websites of their local sales representatives.
Users are strongly advised to check for updates and install the latest driver versions to safeguard their systems against potential exploitation.
The company expressed gratitude to the Microsoft Offensive Research and Security Engineering (MORSE) Team for identifying and reporting the vulnerability.
Their collaboration enabled Canon to respond swiftly to mitigate risks for its customers.
- Upgrade Immediately: Ensure you download and install the updated printer drivers from official sources.
- Monitor Systems: Keep an eye on systems connected to affected printers for unusual activity.
- Secure Networks: Prevent unauthorized access to printers by employing firewalls and network security measures.
As vulnerabilities like CVE-2025-1268 highlight the risks of outdated software, this incident underscores the importance of proactive security practices in protecting modern IT environments.
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates
!