Raleigh, NC

32°F
Scattered Clouds Humidity: 79%
Wind: 2.06 M/S

Canon Printer Vulnerability Lets Hackers Take Full Control

Canon Printer Vulnerability Lets Hackers Take Full Control

Canon Issues Urgent Security Advisory for Critical Printer Driver Vulnerability 

Canon has released a critical security advisory addressing a severe vulnerability in several of its printer drivers that could allow attackers to execute arbitrary code on affected systems. 

The flaw designated CVE-2025-1268, has been assigned a high-severity CVSS base score of 9.4, signaling major security risks for users of impacted Canon products. 

Security researchers have identified an out-of-bounds vulnerability in the EMF Recode processing functionality of multiple Canon Generic Plus printer drivers. This flaw enables malicious actors to execute arbitrary code when a print job is processed through a compromised application. 

Notably, the vulnerability requires no user interaction, privileges, or special access conditions, making it easier for remote attackers to exploit with low complexity. Beyond disrupting printing operations, this flaw could serve as a gateway for more advanced cyberattacks, potentially leading to unauthorized system access and data breaches. 

Canon has credited the Microsoft Offensive Research and Security Engineering Team (MORSE), specifically researcher Robert Ord, for responsibly disclosing the vulnerability. 

Affected Printer Drivers 

Canon confirms that the following printer driver versions are impacted: 

  • Generic Plus PCL6 Printer Driver – V3.12 and earlier 
  • Generic Plus UFR II Printer Driver – V3.12 and earlier 
  • Generic Plus LIPS4 Printer Driver – V3.12 and earlier 
  • Generic Plus LIPSLX Printer Driver – V3.12 and earlier 
  • Generic Plus PS Printer Driver – V3.12 and earlier 

These drivers are widely used across Canon’s production printers, multifunction office printers, and laser printers, affecting thousands of organizations and individual users worldwide. 

Mitigation and Recommendations 

Canon has released updated printer drivers to address this vulnerability and strongly urges all users to install the latest versions available on their regional Canon support websites. 

To enhance security, IT administrators should also implement network segmentation for print servers and monitor printing activities for suspicious behavior. Applying these additional security measures can help mitigate the risk of potential exploits. 

Found this article interesting? Follow us on X(Twitter)  and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.