Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14231: CWE-787: Out-of-bounds Write in Canon Inc. Satera LBP670C Series

0
Critical
VulnerabilityCVE-2025-14231cvecve-2025-14231cwe-787
Published: Thu Jan 15 2026 (01/15/2026, 23:35:27 UTC)
Source: CVE Database V5
Vendor/Project: Canon Inc.
Product: Satera LBP670C Series

Description

CVE-2025-14231 is a critical buffer overflow vulnerability (CWE-787) affecting Canon Inc. Satera LBP670C Series and multiple related printer models across different regional brands, including European i-SENSYS and imageRUNNER devices. The flaw exists in the print job processing component via Web Services for Devices (WSD), allowing unauthenticated attackers on the same network segment to cause denial of service or execute arbitrary code remotely. The vulnerability affects firmware versions 06. 02 and earlier. With a CVSS 4. 0 score of 9. 3, this vulnerability requires no user interaction or privileges, making exploitation straightforward in vulnerable environments. Although no known exploits are currently reported in the wild, the potential impact on confidentiality, integrity, and availability is high. European organizations using affected Canon printers face risks of operational disruption and potential compromise of sensitive print data.

AI-Powered Analysis

AILast updated: 01/15/2026, 23:59:16 UTC

Technical Analysis

CVE-2025-14231 is a critical out-of-bounds write vulnerability classified under CWE-787, discovered in the print job processing functionality of Canon's Small Office Multifunction Printers and Laser Printers, specifically within the Web Services for Devices (WSD) protocol implementation. This vulnerability affects multiple Canon printer series, including the Satera LBP670C and MF750C series sold in Japan, Color imageCLASS and imageRUNNER series sold in the US, and i-SENSYS and imageRUNNER series sold in Europe, all running firmware version 06.02 or earlier. The flaw arises from improper bounds checking during the handling of print jobs, allowing an attacker on the same local network segment to send specially crafted print requests that trigger a buffer overflow. This can lead to the device becoming unresponsive (denial of service) or, more critically, enable remote code execution without requiring any authentication or user interaction. The vulnerability's CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. While no public exploits have been reported yet, the ease of exploitation and the critical nature of the flaw make it a significant threat to organizations relying on these devices. The affected printers are commonly deployed in office environments, making them attractive targets for attackers seeking to disrupt business operations or gain a foothold within internal networks.

Potential Impact

For European organizations, the impact of CVE-2025-14231 is substantial. Exploitation can lead to denial of service, halting printing operations critical to business workflows, or remote code execution, potentially allowing attackers to execute arbitrary commands on the printer. This could be leveraged to pivot into internal networks, exfiltrate sensitive print data, or deploy malware. Given that many European enterprises use Canon i-SENSYS and imageRUNNER printers extensively, especially in sectors like government, finance, and healthcare, the risk of operational disruption and data compromise is high. Additionally, printers often have network access and may be less frequently updated than other IT assets, increasing exposure. The vulnerability's exploitation could also undermine compliance with data protection regulations such as GDPR if sensitive information is leaked or systems are compromised.

Mitigation Recommendations

Organizations should immediately inventory all Canon printers to identify affected models running firmware version 06.02 or earlier. Canon should be contacted for official firmware updates or patches; if none are yet available, organizations should apply compensating controls. These include isolating printers on segmented VLANs with strict access controls limiting network exposure, disabling WSD if not required, and monitoring network traffic for anomalous print job requests. Network intrusion detection systems should be tuned to detect suspicious packets targeting printer services. Additionally, organizations should enforce strict network segmentation between user devices and printers to reduce attack surface. Regularly updating printer firmware as soon as Canon releases patches is critical. Finally, educating IT staff about this vulnerability and ensuring printers are included in vulnerability management programs will help maintain ongoing security.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Canon
Date Reserved
2025-12-07T23:53:30.531Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69697b997c726673b68af95f

Added to database: 1/15/2026, 11:43:21 PM

Last enriched: 1/15/2026, 11:59:16 PM

Last updated: 1/16/2026, 2:44:56 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats