Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14231: CWE-787: Out-of-bounds Write in Canon Inc. Satera LBP670C Series

0
Critical
VulnerabilityCVE-2025-14231cvecve-2025-14231cwe-787
Published: Thu Jan 15 2026 (01/15/2026, 23:35:27 UTC)
Source: CVE Database V5
Vendor/Project: Canon Inc.
Product: Satera LBP670C Series

Description

CVE-2025-14231 is a critical buffer overflow vulnerability (CWE-787) in Canon's Satera LBP670C Series and related multifunction and laser printers. The flaw exists in the print job processing via the Web Services for Devices (WSD) protocol, allowing unauthenticated attackers on the same network segment to cause device unresponsiveness or execute arbitrary code remotely. Affected firmware versions are 06. 02 and earlier, with impacted models sold in Japan, the US, and Europe. The vulnerability has a CVSS 4. 0 score of 9. 3, reflecting its high impact and ease of exploitation without user interaction or privileges. No known exploits are currently reported in the wild. European organizations using these printer models face risks of operational disruption and potential compromise of network security. Immediate firmware updates and network segmentation are recommended to mitigate this threat.

AI-Powered Analysis

AILast updated: 01/23/2026, 20:31:28 UTC

Technical Analysis

CVE-2025-14231 is a critical security vulnerability classified as CWE-787 (Out-of-bounds Write) affecting Canon's Satera LBP670C Series and several related multifunction and laser printer models. The vulnerability arises from a buffer overflow in the print job processing component that handles WSD (Web Services for Devices) protocol requests. WSD is commonly used for network printing and device discovery. An attacker positioned on the same network segment can send specially crafted print jobs exploiting this buffer overflow, leading to either denial of service by rendering the printer unresponsive or remote code execution, potentially allowing full compromise of the device. The affected firmware versions are 06.02 and earlier, covering models sold in Japan, the US, and Europe, including the i-SENSYS and imageCLASS series. The vulnerability requires no authentication, user interaction, or privileges, making it highly exploitable in local network environments. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the severity and ease of exploitation make this a significant threat. The vulnerability could be leveraged to disrupt business operations or pivot into internal networks if printers are connected to sensitive environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk to operational continuity and network security. Exploitation can cause printers to become unresponsive, disrupting printing services critical for daily business functions. More severely, remote code execution could allow attackers to install malware, intercept or alter print jobs, or use compromised printers as footholds for lateral movement within corporate networks. This is particularly concerning for sectors with high reliance on secure document handling, such as government, finance, healthcare, and legal industries. The vulnerability's presence in widely deployed Canon printer models across Europe increases the attack surface. Additionally, unpatched devices in shared office environments or public-facing network segments could be targeted by attackers to gain unauthorized access or disrupt services. The lack of authentication and user interaction requirements further exacerbate the threat, enabling rapid exploitation once the vulnerability is known.

Mitigation Recommendations

1. Immediately identify all Canon printer models affected by this vulnerability within the organization, focusing on Satera LBP670C Series and related i-SENSYS and imageCLASS models with firmware version 06.02 or earlier. 2. Apply firmware updates as soon as Canon releases patches addressing CVE-2025-14231. In the absence of patches, consider disabling WSD protocol support if feasible to reduce exposure. 3. Segment printer devices on isolated network VLANs with strict access controls to limit attacker access to the same network segment. 4. Monitor network traffic for unusual print job patterns or malformed WSD requests that could indicate exploitation attempts. 5. Employ network intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts targeting this vulnerability. 6. Educate IT and security teams about this vulnerability to ensure rapid response and patch management. 7. For critical environments, consider replacing vulnerable printers with models not affected by this issue until patches are available. 8. Review and harden printer management interfaces and restrict administrative access to trusted personnel only.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Canon
Date Reserved
2025-12-07T23:53:30.531Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69697b997c726673b68af95f

Added to database: 1/15/2026, 11:43:21 PM

Last enriched: 1/23/2026, 8:31:28 PM

Last updated: 2/6/2026, 8:12:28 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats