A security vulnerability, tracked as CVE-2025-1268, has been found in certain Canon printer drivers, potentially allowing attackers to execute arbitrary code.
The flaw, categorized as an out-of-bounds vulnerability, affects printer drivers for office multifunction printers, small office printers, production printers, and laser printers.
Canon has acknowledged the issue and urged users to update their printer driver software promptly.
The vulnerability lies in the EMF Recode processing of affected printer drivers, which mishandles certain operations and enables attackers to exploit the system by executing arbitrary code.
This type of attack can occur when the print job is processed by a malicious application. If exploited, the vulnerability may lead to compromising the confidentiality, integrity, and availability of the affected system.
The Common Vulnerability Scoring System (CVSS) v3.1 has rated this flaw with a Base Score of 9.4, indicating a severe risk level. The breakdown of the CVSS rating is as follows:
This score highlights the ease with which the vulnerability can be exploited and the significant impact it could have on systems using the affected printer drivers.
The vulnerability impacts the following Canon printer driver versions:
These drivers are commonly installed on devices ranging from small office printers to production printing systems, meaning the scope of the issue could affect businesses globally.
Canon has announced that updated printer drivers addressing this vulnerability will be made available through the websites of their local sales representatives.
Users are strongly advised to check for updates and install the latest driver versions to safeguard their systems against potential exploitation.
The company expressed gratitude to the Microsoft Offensive Research and Security Engineering (MORSE) Team for identifying and reporting the vulnerability.
Their collaboration enabled Canon to respond swiftly to mitigate risks for its customers.
As vulnerabilities like CVE-2025-1268 highlight the risks of outdated software, this incident underscores the importance of proactive security practices in protecting modern IT environments.
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates
!
Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal…
The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting…
Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass…
Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message traffic,…
The cyber threat landscape has witnessed remarkable adaptation from the notorious hacker collective known as…
North Korean threat actors have demonstrated their adept use of social engineering techniques combined with…