CVE-2025-14234: CWE-787: Out-of-bounds Write in Canon Inc. Satera LBP670C Series
Buffer overflow in CPCA list processing on Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera LBP670C Series/Satera MF750C Series firmware v06.02 and earlier sold in Japan.Color imageCLASS LBP630C/Color imageCLASS MF650C Series/imageCLASS LBP230 Series/imageCLASS X LBP1238 II/imageCLASS MF450 Series/imageCLASS X MF1238 II/imageCLASS X MF1643i II/imageCLASS X MF1643iF II firmware v06.02 and earlier sold in US.i-SENSYS LBP630C Series/i-SENSYS MF650C Series/i-SENSYS LBP230 Series/1238P II/1238Pr II/i-SENSYS MF450 Series/i-SENSYS MF550 Series/1238i II/1238iF II/imageRUNNER 1643i II/imageRUNNER 1643iF II firmware v06.02 and earlier sold in Europe.
AI Analysis
Technical Summary
CVE-2025-14234 is a buffer overflow vulnerability classified under CWE-787, specifically an out-of-bounds write, found in the CPCA list processing functionality of Canon's Small Office Multifunction Printers and Laser Printers. The affected products include the Satera LBP670C Series and related models such as the Satera MF750C Series, Color imageCLASS, i-SENSYS, and imageRUNNER series with firmware version 06.02 or earlier. The vulnerability allows an unauthenticated attacker on the same network segment to send specially crafted network packets that trigger the buffer overflow, potentially causing the printer to crash or enabling arbitrary code execution. This could lead to full device compromise, allowing attackers to manipulate print jobs, intercept sensitive documents, or use the printer as a foothold for further network intrusion. The vulnerability does not require user interaction or privileges, increasing its risk. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no exploits are publicly known yet, the critical severity score of 9.3 underscores the urgency for mitigation. The affected firmware versions are widely deployed across Japan, the US, and Europe, making this a significant threat to organizations relying on these printers.
Potential Impact
The impact of CVE-2025-14234 is substantial for organizations worldwide using the affected Canon printers. Exploitation can lead to complete compromise of the printer device, allowing attackers to execute arbitrary code remotely. This can result in denial of service through device unavailability, interception or manipulation of sensitive print data, and potential lateral movement within the corporate network. Printers often have access to sensitive documents and internal networks, so compromise can expose confidential information and disrupt business operations. Additionally, attackers could leverage compromised printers as persistent footholds or pivot points for further attacks against critical infrastructure. Given the widespread deployment of these printer models in offices across multiple regions, the vulnerability poses a significant operational and data security risk.
Mitigation Recommendations
Organizations should immediately inventory all Canon printers to identify affected models running firmware version 06.02 or earlier. Until Canon releases a firmware patch, network segmentation should be enforced to isolate printers from critical systems and restrict access to trusted management hosts only. Implement strict network access controls and monitor printer network traffic for anomalous activity indicative of exploitation attempts. Disable unnecessary network protocols and services on the printers to reduce attack surface. Employ intrusion detection systems with signatures tuned for buffer overflow attempts targeting printer protocols. Regularly check Canon’s official channels for firmware updates and apply patches promptly once available. Additionally, consider replacing legacy devices that cannot be updated or are no longer supported. Educate IT staff about this vulnerability to ensure rapid response and remediation.
Affected Countries
Japan, United States, Germany, United Kingdom, France, Italy, Spain, Netherlands, Canada
CVE-2025-14234: CWE-787: Out-of-bounds Write in Canon Inc. Satera LBP670C Series
Description
Buffer overflow in CPCA list processing on Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera LBP670C Series/Satera MF750C Series firmware v06.02 and earlier sold in Japan.Color imageCLASS LBP630C/Color imageCLASS MF650C Series/imageCLASS LBP230 Series/imageCLASS X LBP1238 II/imageCLASS MF450 Series/imageCLASS X MF1238 II/imageCLASS X MF1643i II/imageCLASS X MF1643iF II firmware v06.02 and earlier sold in US.i-SENSYS LBP630C Series/i-SENSYS MF650C Series/i-SENSYS LBP230 Series/1238P II/1238Pr II/i-SENSYS MF450 Series/i-SENSYS MF550 Series/1238i II/1238iF II/imageRUNNER 1643i II/imageRUNNER 1643iF II firmware v06.02 and earlier sold in Europe.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14234 is a buffer overflow vulnerability classified under CWE-787, specifically an out-of-bounds write, found in the CPCA list processing functionality of Canon's Small Office Multifunction Printers and Laser Printers. The affected products include the Satera LBP670C Series and related models such as the Satera MF750C Series, Color imageCLASS, i-SENSYS, and imageRUNNER series with firmware version 06.02 or earlier. The vulnerability allows an unauthenticated attacker on the same network segment to send specially crafted network packets that trigger the buffer overflow, potentially causing the printer to crash or enabling arbitrary code execution. This could lead to full device compromise, allowing attackers to manipulate print jobs, intercept sensitive documents, or use the printer as a foothold for further network intrusion. The vulnerability does not require user interaction or privileges, increasing its risk. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no exploits are publicly known yet, the critical severity score of 9.3 underscores the urgency for mitigation. The affected firmware versions are widely deployed across Japan, the US, and Europe, making this a significant threat to organizations relying on these printers.
Potential Impact
The impact of CVE-2025-14234 is substantial for organizations worldwide using the affected Canon printers. Exploitation can lead to complete compromise of the printer device, allowing attackers to execute arbitrary code remotely. This can result in denial of service through device unavailability, interception or manipulation of sensitive print data, and potential lateral movement within the corporate network. Printers often have access to sensitive documents and internal networks, so compromise can expose confidential information and disrupt business operations. Additionally, attackers could leverage compromised printers as persistent footholds or pivot points for further attacks against critical infrastructure. Given the widespread deployment of these printer models in offices across multiple regions, the vulnerability poses a significant operational and data security risk.
Mitigation Recommendations
Organizations should immediately inventory all Canon printers to identify affected models running firmware version 06.02 or earlier. Until Canon releases a firmware patch, network segmentation should be enforced to isolate printers from critical systems and restrict access to trusted management hosts only. Implement strict network access controls and monitor printer network traffic for anomalous activity indicative of exploitation attempts. Disable unnecessary network protocols and services on the printers to reduce attack surface. Employ intrusion detection systems with signatures tuned for buffer overflow attempts targeting printer protocols. Regularly check Canon’s official channels for firmware updates and apply patches promptly once available. Additionally, consider replacing legacy devices that cannot be updated or are no longer supported. Educate IT staff about this vulnerability to ensure rapid response and remediation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Canon
- Date Reserved
- 2025-12-07T23:53:37.575Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69697b997c726673b68af971
Added to database: 1/15/2026, 11:43:21 PM
Last enriched: 2/27/2026, 7:09:20 AM
Last updated: 3/26/2026, 3:04:30 AM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.