Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14232: CWE-787: Out-of-bounds Write in Canon Inc. Satera LBP670C Series

0
Critical
VulnerabilityCVE-2025-14232cvecve-2025-14232cwe-787
Published: Thu Jan 15 2026 (01/15/2026, 23:36:27 UTC)
Source: CVE Database V5
Vendor/Project: Canon Inc.
Product: Satera LBP670C Series

Description

CVE-2025-14232 is a critical buffer overflow vulnerability (CWE-787) in the XML processing of XPS files on Canon multifunction and laser printers, including the Satera LBP670C series and various imageCLASS and i-SENSYS models. Exploitation requires no authentication or user interaction and can be triggered remotely over the network, potentially causing device unresponsiveness or arbitrary code execution. The affected firmware versions are 06. 02 and earlier. This vulnerability poses a significant risk to networked printers widely used in European organizations, potentially allowing attackers to disrupt printing services or gain footholds within corporate networks. No known exploits are currently in the wild, but the high CVSS score of 9. 3 indicates critical severity. Immediate patching and network segmentation are essential to mitigate risks. European countries with high adoption of Canon printers and critical infrastructure reliance on these devices are most at risk.

AI-Powered Analysis

AILast updated: 01/23/2026, 20:31:44 UTC

Technical Analysis

CVE-2025-14232 is a critical security vulnerability classified as CWE-787 (Out-of-bounds Write) affecting Canon Inc.'s Small Office Multifunction Printers and Laser Printers, specifically the Satera LBP670C Series and multiple imageCLASS and i-SENSYS models. The flaw exists in the XML processing component that handles XPS (XML Paper Specification) files, which are commonly used for printing documents. When an attacker sends a specially crafted XPS file over the network to an affected printer running firmware version 06.02 or earlier, the buffer overflow can be triggered. This overflow allows the attacker to overwrite memory beyond the intended buffer boundaries, leading to potential arbitrary code execution or causing the device to become unresponsive (denial of service). The vulnerability requires no authentication or user interaction, making it remotely exploitable by anyone with network access to the printer. The CVSS 4.0 base score is 9.3, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction needed. The affected products are sold globally, including Europe, where these printer models are widely deployed in corporate and governmental environments. Although no exploits have been reported in the wild yet, the critical nature of this vulnerability and the common use of these printers in networked environments make it a significant threat. The lack of available patches at the time of disclosure increases the urgency for mitigation through network controls and monitoring.

Potential Impact

For European organizations, this vulnerability presents a severe risk to operational continuity and information security. Exploitation could allow attackers to execute arbitrary code on printers, potentially enabling lateral movement within corporate networks or data exfiltration through compromised devices. Denial of service conditions could disrupt printing services critical for business operations, especially in sectors like government, finance, healthcare, and manufacturing where Canon printers are prevalent. The vulnerability's remote exploitability without authentication increases the attack surface, particularly in environments where printers are accessible from less secure network segments or exposed to the internet. Additionally, compromised printers could serve as persistent footholds or pivot points for further attacks on enterprise infrastructure. The impact extends beyond individual devices to organizational reputation and compliance with data protection regulations such as GDPR, given the potential for unauthorized data access or service disruption.

Mitigation Recommendations

1. Immediately identify all Canon printer models affected by this vulnerability within the network, focusing on firmware versions 06.02 and earlier. 2. Apply firmware updates as soon as Canon releases patches addressing CVE-2025-14232; monitor Canon's official channels for updates. 3. Until patches are available, isolate affected printers on dedicated VLANs or network segments with strict access controls to limit exposure. 4. Implement network-level filtering to block unauthorized inbound traffic to printer management interfaces and restrict printing protocols to trusted hosts only. 5. Monitor network traffic for unusual XPS file submissions or anomalous printer behavior indicative of exploitation attempts. 6. Enforce strong network segmentation between printers and critical IT infrastructure to prevent lateral movement. 7. Conduct regular security audits and vulnerability scans on printer devices to detect outdated firmware or configuration weaknesses. 8. Educate IT staff about this vulnerability to ensure rapid response and incident handling if exploitation is suspected. 9. Consider disabling unnecessary printer services or protocols that process XPS files if feasible. 10. Maintain an inventory of all networked printers and their firmware versions to facilitate timely vulnerability management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Canon
Date Reserved
2025-12-07T23:53:33.202Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69697b997c726673b68af965

Added to database: 1/15/2026, 11:43:21 PM

Last enriched: 1/23/2026, 8:31:44 PM

Last updated: 2/7/2026, 7:16:06 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats