Cyber Security News

Canon Printer Vulnerability Allows Attackers to Execute Arbitrary Code

A security vulnerability, tracked as CVE-2025-1268, has been found in certain Canon printer drivers, potentially allowing attackers to execute arbitrary code.

The flaw, categorized as an out-of-bounds vulnerability, affects printer drivers for office multifunction printers, small office printers, production printers, and laser printers.

Canon has acknowledged the issue and urged users to update their printer driver software promptly.

Details of the Vulnerability

The vulnerability lies in the EMF Recode processing of affected printer drivers, which mishandles certain operations and enables attackers to exploit the system by executing arbitrary code.

This type of attack can occur when the print job is processed by a malicious application. If exploited, the vulnerability may lead to compromising the confidentiality, integrity, and availability of the affected system.

The Common Vulnerability Scoring System (CVSS) v3.1 has rated this flaw with a Base Score of 9.4, indicating a severe risk level. The breakdown of the CVSS rating is as follows:

  • Attack Vector (AV): Network
  • Attack Complexity (AC): Low
  • Privileges Required (PR): None
  • User Interaction (UI): None
  • Scope (S): Unchanged
  • Confidentiality (C): High
  • Integrity (I): High
  • Availability (A): Low

This score highlights the ease with which the vulnerability can be exploited and the significant impact it could have on systems using the affected printer drivers.

Affected Printer Drivers

The vulnerability impacts the following Canon printer driver versions:

  • Generic Plus PCL6 Printer Driver – V3.12 and earlier
  • Generic Plus UFR II Printer Driver – V3.12 and earlier
  • Generic Plus LIPS4 Printer Driver – V3.12 and earlier
  • Generic Plus LIPSLX Printer Driver – V3.12 and earlier
  • Generic Plus PS Printer Driver – V3.12 and earlier

These drivers are commonly installed on devices ranging from small office printers to production printing systems, meaning the scope of the issue could affect businesses globally.

Remediation and Mitigation

Canon has announced that updated printer drivers addressing this vulnerability will be made available through the websites of their local sales representatives.

Users are strongly advised to check for updates and install the latest driver versions to safeguard their systems against potential exploitation.

The company expressed gratitude to the Microsoft Offensive Research and Security Engineering (MORSE) Team for identifying and reporting the vulnerability.

Their collaboration enabled Canon to respond swiftly to mitigate risks for its customers.

  • Upgrade Immediately: Ensure you download and install the updated printer drivers from official sources.
  • Monitor Systems: Keep an eye on systems connected to affected printers for unusual activity.
  • Secure Networks: Prevent unauthorized access to printers by employing firewalls and network security measures.

As vulnerabilities like CVE-2025-1268 highlight the risks of outdated software, this incident underscores the importance of proactive security practices in protecting modern IT environments.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal…

46 minutes ago

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting…

2 hours ago

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass…

2 hours ago

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message traffic,…

3 hours ago

Scattered Spider Launches Sophisticated Attacks to Steal Login Credentials and MFA Tokens

The cyber threat landscape has witnessed remarkable adaptation from the notorious hacker collective known as…

3 hours ago

North Korean Hackers Use Social Engineering and Python Scripts to Execute Stealthy Commands

North Korean threat actors have demonstrated their adept use of social engineering techniques combined with…

3 hours ago