Canon Issues Urgent Security Advisory for Critical Printer Driver Vulnerability
Canon has released a critical security advisory addressing a severe vulnerability in several of its printer drivers that could allow attackers to execute arbitrary code on affected systems.
The flaw designated CVE-2025-1268, has been assigned a high-severity CVSS base score of 9.4, signaling major security risks for users of impacted Canon products.
Security researchers have identified an out-of-bounds vulnerability in the EMF Recode processing functionality of multiple Canon Generic Plus printer drivers. This flaw enables malicious actors to execute arbitrary code when a print job is processed through a compromised application.
Notably, the vulnerability requires no user interaction, privileges, or special access conditions, making it easier for remote attackers to exploit with low complexity. Beyond disrupting printing operations, this flaw could serve as a gateway for more advanced cyberattacks, potentially leading to unauthorized system access and data breaches.
Canon has credited the Microsoft Offensive Research and Security Engineering Team (MORSE), specifically researcher Robert Ord, for responsibly disclosing the vulnerability.
Affected Printer Drivers
Canon confirms that the following printer driver versions are impacted:
- Generic Plus PCL6 Printer Driver – V3.12 and earlier
- Generic Plus UFR II Printer Driver – V3.12 and earlier
- Generic Plus LIPS4 Printer Driver – V3.12 and earlier
- Generic Plus LIPSLX Printer Driver – V3.12 and earlier
- Generic Plus PS Printer Driver – V3.12 and earlier
These drivers are widely used across Canon’s production printers, multifunction office printers, and laser printers, affecting thousands of organizations and individual users worldwide.
Mitigation and Recommendations
Canon has released updated printer drivers to address this vulnerability and strongly urges all users to install the latest versions available on their regional Canon support websites.
To enhance security, IT administrators should also implement network segmentation for print servers and monitor printing activities for suspicious behavior. Applying these additional security measures can help mitigate the risk of potential exploits.
Found this article interesting? Follow us on X(Twitter) and FaceBook to read more exclusive content we post.