Description

Canon has released software updates to address seven critical-severity vulnerabilities affecting various small office printer models. These vulnerabilities, identified as buffer overflow bugs, can potentially lead to remote code execution (RCE) or cause the affected product to become unresponsive when exploited over the network. Canon emphasizes that if a printer is directly connected to the internet without a router, unauthenticated remote attackers may exploit these flaws to execute arbitrary code or launch denial-of-service (DoS) attacks. The vulnerabilities, tracked as CVE-2023-6229 through CVE-2023-6234 and CVE-2024-0244, have a CVSS score of 9.8 according to Japan’s vulnerability information portal JVN. These flaws were found in various components such as the CPCA PDL resource download process, Address Book password process, and WSD probe request process. Affected printer models vary by region, including i-SENSYS and imageCLASS series in Europe and North America, and Satera series in Japan, all running firmware versions 03.07 and earlier. While there have been no reported exploits of these vulnerabilities, Canon advises customers to install the latest firmware updates available for their affected printer models to enhance security. Additionally, customers are urged to restrict printer access by using firewalls or routers and assigning private IP addresses. All seven vulnerabilities were reported through Trend Micro’s Zero Day Initiative (ZDI), highlighting the importance of ongoing vigilance and proactive security measures.