Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1268: CWE-787: Out-of-bounds Write in Canon Inc. Generic Plus PCL6 Printer Driver

0
Critical
VulnerabilityCVE-2025-1268cvecve-2025-1268cwe-787
Published: Mon Mar 31 2025 (03/31/2025, 00:52:18 UTC)
Source: CVE
Vendor/Project: Canon Inc.
Product: Generic Plus PCL6 Printer Driver

Description

Out-of-bounds vulnerability in EMF Recode processing of Generic Plus PCL6 Printer Driver / Generic Plus UFR II Printer Driver / Generic Plus LIPS4 Printer Driver / Generic Plus LIPSLX Printer Driver / Generic Plus PS Printer Driver / Generic FAX Printer Driver / UFRII LT Printer Driver / CARPS2 Printer Driver / PDF Driver / LIPS4 Printer Driver / LIPSLX Printer Driver / UFR II Printer Driver / PS Printer Driver / PCL6 Printer Driver

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 08:43:18 UTC

Technical Analysis

CVE-2025-1268 is a critical security vulnerability classified under CWE-787 (Out-of-bounds Write) affecting Canon Inc.'s Generic Plus printer drivers, including but not limited to PCL6, UFR II, LIPS4, PS, and FAX drivers. The flaw exists in the EMF Recode processing component of these drivers, which improperly handles memory boundaries during data processing. This out-of-bounds write can be triggered remotely without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation allows an attacker to execute arbitrary code with the privileges of the affected driver process, potentially leading to full system compromise. The vulnerability impacts driver versions 3.12 and earlier. Although no public exploits have been reported yet, the critical CVSS score of 9.4 reflects the high potential impact on confidentiality and integrity, with a low complexity attack vector. The affected drivers are widely used in various Canon printer models deployed in enterprise, government, and industrial environments globally. The vulnerability's root cause is a memory safety error during Enhanced Metafile (EMF) data recoding, which is a common format for print jobs. This flaw could be exploited by sending a specially crafted print job to a vulnerable printer driver, causing memory corruption and enabling code execution. Canon has not yet released patches, so organizations must remain vigilant. The vulnerability is tracked and enriched by CISA, highlighting its significance in the cybersecurity community.

Potential Impact

The impact of CVE-2025-1268 is severe for organizations worldwide that use Canon Generic Plus printer drivers. Exploitation can lead to arbitrary code execution on affected systems, compromising confidentiality, integrity, and availability. Attackers could gain control over print servers or endpoints, potentially pivoting to other internal resources, stealing sensitive data, or disrupting printing services critical to business operations. Given that printers are often connected to corporate networks and sometimes overlooked in security policies, this vulnerability presents an attractive attack vector. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the risk of automated or widespread exploitation. Critical infrastructure sectors, government agencies, and large enterprises relying on Canon printers for document handling are particularly vulnerable. The vulnerability could also facilitate ransomware attacks or espionage campaigns by providing initial access or persistence mechanisms. The broad range of affected driver variants increases the attack surface, impacting diverse environments globally.

Mitigation Recommendations

Organizations should implement the following specific mitigations: 1) Monitor Canon's official channels closely for the release of security patches addressing CVE-2025-1268 and apply them promptly across all affected printer drivers. 2) Restrict network access to print servers and printers by implementing network segmentation and firewall rules to limit exposure to untrusted networks. 3) Disable or restrict remote printing capabilities where feasible, especially from external or guest networks. 4) Employ application whitelisting and endpoint protection solutions to detect and block anomalous behavior related to printer driver exploitation. 5) Audit and monitor print server logs and network traffic for unusual print job submissions or malformed EMF data patterns that could indicate exploitation attempts. 6) Consider temporarily replacing vulnerable Canon drivers with alternative drivers or print management solutions if patching is delayed. 7) Educate IT and security teams about this vulnerability to ensure rapid incident response if exploitation is suspected. 8) Maintain up-to-date backups of critical systems to recover from potential ransomware or destructive attacks leveraging this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Canon
Date Reserved
2025-02-13T06:57:20.778Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd7e04

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 3/16/2026, 8:43:18 AM

Last updated: 3/26/2026, 11:29:22 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses