Multiple critical security vulnerabilities affecting Canon Laser Printers and Small Office Multifunctional Printers.
These vulnerabilities, identified as buffer overflow flaws, could allow attackers to execute arbitrary code remotely or render the devices inoperative through Denial-of-Service (DoS) attacks.
The affected models include the imageCLASS MF Series (MF656CDW, MF654CDW, MF653CDW, MF652CW) and imageCLASS LBP Series (LBP632CDW, LBP633CDW).
The vulnerabilities are tracked under the following Common Vulnerabilities and Exposures (CVE) identifiers:
These flaws have been assigned a critical CVSS v3.1 base score of 9.8, indicating severe potential consequences.
Collect Threat Intelligence with TI Lookup to Improve Your Company’s Security - Get 50 Free Request
Exploitation could allow attackers on the same network segment to execute arbitrary code or cause the printer to become unresponsive.
While no public proof-of-concept exploits have been reported yet, the vulnerabilities pose significant risks to organizations using these devices.
Buffer overflow vulnerabilities occur when more data is written to a buffer than it can accommodate, leading to memory corruption.
In Canon’s case, these flaws can be exploited via specially crafted network packets or print jobs. Successful exploitation could result in:
The vulnerabilities impact multiple product lines across regions, including:
“We recommend that our customers set a private IP address for the products and create a network environment with a firewall or wired/Wi-Fi router that can restrict network access”, the company said.
Canon strongly advises users to take immediate action to secure their devices by implementing the following measures:
Install the latest firmware available for affected models by following these steps:
By addressing these vulnerabilities promptly and adopting best practices for device security, organizations can minimize risks and ensure operational continuity in their printing environments.
For Daily Security Updates! Follow us on Google News, LinkedIn, and X
Cary, NC, March 24th, 2025, CyberNewsWire INE Security, a global provider of cybersecurity training and…
A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing…
A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails…
INTERPOL led a multi-national law enforcement operation dubbed "Operation Red Card," which has resulted in…
A novel attack vector combining browser cache exploitation and DLL proxying has emerged as a…
A groundbreaking security tool has emerged in the ongoing battle against sophisticated Linux malware. A…