Wednesday, April 2, 2025
HomeCVE/vulnerabilityCanon Printer Vulnerability Allows Attackers to Execute Arbitrary Code

Canon Printer Vulnerability Allows Attackers to Execute Arbitrary Code

Published on

SIEM as a Service

Follow Us on Google News

A security vulnerability, tracked as CVE-2025-1268, has been found in certain Canon printer drivers, potentially allowing attackers to execute arbitrary code.

The flaw, categorized as an out-of-bounds vulnerability, affects printer drivers for office multifunction printers, small office printers, production printers, and laser printers.

Canon has acknowledged the issue and urged users to update their printer driver software promptly.

Details of the Vulnerability

The vulnerability lies in the EMF Recode processing of affected printer drivers, which mishandles certain operations and enables attackers to exploit the system by executing arbitrary code.

This type of attack can occur when the print job is processed by a malicious application. If exploited, the vulnerability may lead to compromising the confidentiality, integrity, and availability of the affected system.

The Common Vulnerability Scoring System (CVSS) v3.1 has rated this flaw with a Base Score of 9.4, indicating a severe risk level. The breakdown of the CVSS rating is as follows:

  • Attack Vector (AV): Network
  • Attack Complexity (AC): Low
  • Privileges Required (PR): None
  • User Interaction (UI): None
  • Scope (S): Unchanged
  • Confidentiality (C): High
  • Integrity (I): High
  • Availability (A): Low

This score highlights the ease with which the vulnerability can be exploited and the significant impact it could have on systems using the affected printer drivers.

Affected Printer Drivers

The vulnerability impacts the following Canon printer driver versions:

  • Generic Plus PCL6 Printer Driver – V3.12 and earlier
  • Generic Plus UFR II Printer Driver – V3.12 and earlier
  • Generic Plus LIPS4 Printer Driver – V3.12 and earlier
  • Generic Plus LIPSLX Printer Driver – V3.12 and earlier
  • Generic Plus PS Printer Driver – V3.12 and earlier

These drivers are commonly installed on devices ranging from small office printers to production printing systems, meaning the scope of the issue could affect businesses globally.

Remediation and Mitigation

Canon has announced that updated printer drivers addressing this vulnerability will be made available through the websites of their local sales representatives.

Users are strongly advised to check for updates and install the latest driver versions to safeguard their systems against potential exploitation.

The company expressed gratitude to the Microsoft Offensive Research and Security Engineering (MORSE) Team for identifying and reporting the vulnerability.

Their collaboration enabled Canon to respond swiftly to mitigate risks for its customers.

  • Upgrade Immediately: Ensure you download and install the updated printer drivers from official sources.
  • Monitor Systems: Keep an eye on systems connected to affected printers for unusual activity.
  • Secure Networks: Prevent unauthorized access to printers by employing firewalls and network security measures.

As vulnerabilities like CVE-2025-1268 highlight the risks of outdated software, this incident underscores the importance of proactive security practices in protecting modern IT environments.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Brinker Named Among “10 Most Promising Defense Tech Startups of 2025”

Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has...

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the...

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB),...

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the...

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB),...

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other...