CVE-2025-14236: CWE-787: Out-of-bounds Write in Canon Inc. Satera LBP670C Series
CVE-2025-14236 is a critical buffer overflow vulnerability (CWE-787) affecting Canon multifunction printers, including the Satera LBP670C Series and various imageCLASS and i-SENSYS models with firmware version 06. 02 and earlier. The flaw exists in the Address Book attribute tag processing, allowing an unauthenticated attacker on the same network segment to trigger device unresponsiveness or execute arbitrary code remotely without user interaction. This vulnerability has a CVSS 4. 0 score of 9. 3, indicating high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a significant risk. European organizations using affected i-SENSYS and imageRUNNER devices are particularly at risk. Immediate firmware updates and network segmentation are critical to mitigate this threat.
AI Analysis
Technical Summary
CVE-2025-14236 is a buffer overflow vulnerability classified under CWE-787 found in Canon's Small Office Multifunction Printers, specifically in the Address Book attribute tag processing component. The affected devices include multiple Canon printer series such as Satera LBP670C, Satera MF750C, Color imageCLASS LBP630C, MF650C, LBP230, X LBP1238 II, MF450, MF1238 II, MF1643i II, MF1643iF II, i-SENSYS LBP630C, MF650C, LBP230, MF450, MF550, imageRUNNER 1643i II, and 1643iF II with firmware versions 06.02 and earlier. The vulnerability allows an unauthenticated attacker on the same network segment to send specially crafted packets that overflow a buffer during the processing of Address Book attribute tags. This can cause the device to become unresponsive (denial of service) or enable remote code execution, compromising device confidentiality, integrity, and availability. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) highlights that no privileges or user interaction are required, and the attack can be performed remotely over the network with low complexity. Although no known exploits have been reported in the wild, the critical severity score of 9.3 underscores the urgency for remediation. The vulnerability affects devices sold in Japan, the US, and Europe, with European models primarily under the i-SENSYS and imageRUNNER branding. The lack of available patches at the time of publication necessitates immediate risk mitigation through network controls and monitoring.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of Canon i-SENSYS and imageRUNNER multifunction printers in offices and enterprises. Exploitation could lead to complete device compromise, allowing attackers to execute arbitrary code, potentially pivot within internal networks, exfiltrate sensitive data stored or processed by the device, or disrupt business operations through denial of service. Given that these printers often handle sensitive documents and are integrated into corporate networks, the confidentiality and integrity of organizational data are at risk. The vulnerability's ability to be exploited without authentication or user interaction increases the likelihood of successful attacks, especially in environments with flat or poorly segmented networks. Additionally, disruption of printing services can impact operational continuity. The lack of known exploits currently provides a window for proactive defense, but the critical severity demands urgent attention.
Mitigation Recommendations
1. Immediately identify and inventory all affected Canon devices within the network, focusing on i-SENSYS and imageRUNNER models with firmware version 06.02 or earlier. 2. Apply firmware updates as soon as Canon releases patches addressing CVE-2025-14236. Until patches are available, implement strict network segmentation to isolate affected printers from critical systems and restrict access to trusted management networks only. 3. Employ network-level controls such as Access Control Lists (ACLs) and firewall rules to block unauthorized traffic to printer management interfaces and restrict communication to known, trusted hosts. 4. Monitor network traffic for anomalous packets targeting the Address Book attribute processing, using intrusion detection/prevention systems (IDS/IPS) with updated signatures once available. 5. Disable unnecessary network protocols and services on the printers to reduce the attack surface. 6. Educate IT staff on the vulnerability specifics to ensure rapid response and incident handling. 7. Regularly audit printer firmware versions and configurations as part of vulnerability management programs. 8. Consider deploying endpoint detection solutions capable of monitoring printer behavior for signs of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-14236: CWE-787: Out-of-bounds Write in Canon Inc. Satera LBP670C Series
Description
CVE-2025-14236 is a critical buffer overflow vulnerability (CWE-787) affecting Canon multifunction printers, including the Satera LBP670C Series and various imageCLASS and i-SENSYS models with firmware version 06. 02 and earlier. The flaw exists in the Address Book attribute tag processing, allowing an unauthenticated attacker on the same network segment to trigger device unresponsiveness or execute arbitrary code remotely without user interaction. This vulnerability has a CVSS 4. 0 score of 9. 3, indicating high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a significant risk. European organizations using affected i-SENSYS and imageRUNNER devices are particularly at risk. Immediate firmware updates and network segmentation are critical to mitigate this threat.
AI-Powered Analysis
Technical Analysis
CVE-2025-14236 is a buffer overflow vulnerability classified under CWE-787 found in Canon's Small Office Multifunction Printers, specifically in the Address Book attribute tag processing component. The affected devices include multiple Canon printer series such as Satera LBP670C, Satera MF750C, Color imageCLASS LBP630C, MF650C, LBP230, X LBP1238 II, MF450, MF1238 II, MF1643i II, MF1643iF II, i-SENSYS LBP630C, MF650C, LBP230, MF450, MF550, imageRUNNER 1643i II, and 1643iF II with firmware versions 06.02 and earlier. The vulnerability allows an unauthenticated attacker on the same network segment to send specially crafted packets that overflow a buffer during the processing of Address Book attribute tags. This can cause the device to become unresponsive (denial of service) or enable remote code execution, compromising device confidentiality, integrity, and availability. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) highlights that no privileges or user interaction are required, and the attack can be performed remotely over the network with low complexity. Although no known exploits have been reported in the wild, the critical severity score of 9.3 underscores the urgency for remediation. The vulnerability affects devices sold in Japan, the US, and Europe, with European models primarily under the i-SENSYS and imageRUNNER branding. The lack of available patches at the time of publication necessitates immediate risk mitigation through network controls and monitoring.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of Canon i-SENSYS and imageRUNNER multifunction printers in offices and enterprises. Exploitation could lead to complete device compromise, allowing attackers to execute arbitrary code, potentially pivot within internal networks, exfiltrate sensitive data stored or processed by the device, or disrupt business operations through denial of service. Given that these printers often handle sensitive documents and are integrated into corporate networks, the confidentiality and integrity of organizational data are at risk. The vulnerability's ability to be exploited without authentication or user interaction increases the likelihood of successful attacks, especially in environments with flat or poorly segmented networks. Additionally, disruption of printing services can impact operational continuity. The lack of known exploits currently provides a window for proactive defense, but the critical severity demands urgent attention.
Mitigation Recommendations
1. Immediately identify and inventory all affected Canon devices within the network, focusing on i-SENSYS and imageRUNNER models with firmware version 06.02 or earlier. 2. Apply firmware updates as soon as Canon releases patches addressing CVE-2025-14236. Until patches are available, implement strict network segmentation to isolate affected printers from critical systems and restrict access to trusted management networks only. 3. Employ network-level controls such as Access Control Lists (ACLs) and firewall rules to block unauthorized traffic to printer management interfaces and restrict communication to known, trusted hosts. 4. Monitor network traffic for anomalous packets targeting the Address Book attribute processing, using intrusion detection/prevention systems (IDS/IPS) with updated signatures once available. 5. Disable unnecessary network protocols and services on the printers to reduce the attack surface. 6. Educate IT staff on the vulnerability specifics to ensure rapid response and incident handling. 7. Regularly audit printer firmware versions and configurations as part of vulnerability management programs. 8. Consider deploying endpoint detection solutions capable of monitoring printer behavior for signs of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Canon
- Date Reserved
- 2025-12-07T23:53:42.485Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69697b997c726673b68af97d
Added to database: 1/15/2026, 11:43:21 PM
Last enriched: 1/23/2026, 8:32:48 PM
Last updated: 2/6/2026, 12:53:24 PM
Views: 133
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2054: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2018: SQL Injection in itsourcecode School Management System
MediumCVE-2026-2017: Stack-based Buffer Overflow in IP-COM W30AP
CriticalCVE-2026-1293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yoast Yoast SEO – Advanced SEO with real-time guidance and built-in AI
MediumCVE-2026-2016: Stack-based Buffer Overflow in happyfish100 libfastcommon
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.