CVE-2025-14237: CWE-787: Out-of-bounds Write in Canon Inc. Satera LBP670C Series
Buffer overflow in XPS font parse processing on Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera LBP670C Series/Satera MF750C Series firmware v06.02 and earlier sold in Japan.Color imageCLASS LBP630C/Color imageCLASS MF650C Series/imageCLASS LBP230 Series/imageCLASS X LBP1238 II/imageCLASS MF450 Series/imageCLASS X MF1238 II/imageCLASS X MF1643i II/imageCLASS X MF1643iF II firmware v06.02 and earlier sold in US.i-SENSYS LBP630C Series/i-SENSYS MF650C Series/i-SENSYS LBP230 Series/1238P II/1238Pr II/i-SENSYS MF450 Series/i-SENSYS MF550 Series/1238i II/1238iF II/imageRUNNER 1643i II/imageRUNNER 1643iF II firmware v06.02 and earlier sold in Europe.
AI Analysis
Technical Summary
CVE-2025-14237 is a buffer overflow vulnerability classified under CWE-787 that exists in the XPS font parsing functionality of Canon's Small Office Multifunction Printers and Laser Printers, specifically the Satera LBP670C Series and multiple other related models across different regional brands (Color imageCLASS, i-SENSYS, imageRUNNER). The flaw resides in the way the printer firmware (version 06.02 and earlier) processes XPS font data, allowing an attacker on the same network segment to send specially crafted print jobs that trigger an out-of-bounds write. This can lead to memory corruption, causing the device to crash or enabling the execution of arbitrary code with no authentication or user interaction required. The vulnerability affects a broad range of devices sold in Japan, the US, and Europe, indicating a wide attack surface. The CVSS 4.0 base score of 9.3 highlights the critical nature of this issue, with network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. While no public exploits are currently known, the vulnerability's characteristics make it a prime candidate for future exploitation, especially in environments where these printers are accessible on internal networks. The lack of available patches at the time of disclosure increases the urgency for interim mitigations.
Potential Impact
The exploitation of CVE-2025-14237 can have severe consequences for organizations worldwide. Attackers can remotely crash affected printers, causing denial of service and disrupting business operations reliant on printing and scanning functions. More critically, arbitrary code execution could allow attackers to take control of the printer, potentially using it as a foothold to pivot into internal networks, exfiltrate sensitive documents, or launch further attacks. Given that these printers often handle confidential documents, the compromise could lead to data leakage or manipulation. The vulnerability's network-based exploitation without authentication means that attackers only need access to the same network segment, which could be achieved via compromised devices or insider threats. Organizations with large deployments of Canon multifunction printers in office environments, especially those in regulated industries or with sensitive data, face heightened risk. The broad geographic distribution of affected models also means multinational organizations must consider global exposure. The inability to patch immediately may prolong the window of vulnerability, increasing the risk of exploitation.
Mitigation Recommendations
To mitigate CVE-2025-14237, organizations should first check for and apply any firmware updates released by Canon addressing this vulnerability as soon as they become available. Until patches are deployed, network segmentation should be enforced to isolate affected printers from general user networks and restrict access to trusted devices only. Implement strict access controls and monitor network traffic for unusual print job submissions or malformed XPS font data packets. Disable unnecessary network protocols and services on the printers to reduce the attack surface. Employ network intrusion detection systems (NIDS) tuned to detect anomalous traffic patterns targeting printer ports and protocols. Regularly audit printer firmware versions and configurations to ensure compliance with security policies. Additionally, consider replacing end-of-life or unsupported printer models that cannot be patched. Educate IT staff about the risks of printer vulnerabilities and establish incident response plans specifically for printer-related security incidents.
Affected Countries
Japan, United States, Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2025-14237: CWE-787: Out-of-bounds Write in Canon Inc. Satera LBP670C Series
Description
Buffer overflow in XPS font parse processing on Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera LBP670C Series/Satera MF750C Series firmware v06.02 and earlier sold in Japan.Color imageCLASS LBP630C/Color imageCLASS MF650C Series/imageCLASS LBP230 Series/imageCLASS X LBP1238 II/imageCLASS MF450 Series/imageCLASS X MF1238 II/imageCLASS X MF1643i II/imageCLASS X MF1643iF II firmware v06.02 and earlier sold in US.i-SENSYS LBP630C Series/i-SENSYS MF650C Series/i-SENSYS LBP230 Series/1238P II/1238Pr II/i-SENSYS MF450 Series/i-SENSYS MF550 Series/1238i II/1238iF II/imageRUNNER 1643i II/imageRUNNER 1643iF II firmware v06.02 and earlier sold in Europe.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14237 is a buffer overflow vulnerability classified under CWE-787 that exists in the XPS font parsing functionality of Canon's Small Office Multifunction Printers and Laser Printers, specifically the Satera LBP670C Series and multiple other related models across different regional brands (Color imageCLASS, i-SENSYS, imageRUNNER). The flaw resides in the way the printer firmware (version 06.02 and earlier) processes XPS font data, allowing an attacker on the same network segment to send specially crafted print jobs that trigger an out-of-bounds write. This can lead to memory corruption, causing the device to crash or enabling the execution of arbitrary code with no authentication or user interaction required. The vulnerability affects a broad range of devices sold in Japan, the US, and Europe, indicating a wide attack surface. The CVSS 4.0 base score of 9.3 highlights the critical nature of this issue, with network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. While no public exploits are currently known, the vulnerability's characteristics make it a prime candidate for future exploitation, especially in environments where these printers are accessible on internal networks. The lack of available patches at the time of disclosure increases the urgency for interim mitigations.
Potential Impact
The exploitation of CVE-2025-14237 can have severe consequences for organizations worldwide. Attackers can remotely crash affected printers, causing denial of service and disrupting business operations reliant on printing and scanning functions. More critically, arbitrary code execution could allow attackers to take control of the printer, potentially using it as a foothold to pivot into internal networks, exfiltrate sensitive documents, or launch further attacks. Given that these printers often handle confidential documents, the compromise could lead to data leakage or manipulation. The vulnerability's network-based exploitation without authentication means that attackers only need access to the same network segment, which could be achieved via compromised devices or insider threats. Organizations with large deployments of Canon multifunction printers in office environments, especially those in regulated industries or with sensitive data, face heightened risk. The broad geographic distribution of affected models also means multinational organizations must consider global exposure. The inability to patch immediately may prolong the window of vulnerability, increasing the risk of exploitation.
Mitigation Recommendations
To mitigate CVE-2025-14237, organizations should first check for and apply any firmware updates released by Canon addressing this vulnerability as soon as they become available. Until patches are deployed, network segmentation should be enforced to isolate affected printers from general user networks and restrict access to trusted devices only. Implement strict access controls and monitor network traffic for unusual print job submissions or malformed XPS font data packets. Disable unnecessary network protocols and services on the printers to reduce the attack surface. Employ network intrusion detection systems (NIDS) tuned to detect anomalous traffic patterns targeting printer ports and protocols. Regularly audit printer firmware versions and configurations to ensure compliance with security policies. Additionally, consider replacing end-of-life or unsupported printer models that cannot be patched. Educate IT staff about the risks of printer vulnerabilities and establish incident response plans specifically for printer-related security incidents.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Canon
- Date Reserved
- 2025-12-07T23:53:44.786Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69697f1e7c726673b68c4162
Added to database: 1/15/2026, 11:58:22 PM
Last enriched: 2/27/2026, 7:10:17 AM
Last updated: 3/25/2026, 4:28:44 AM
Views: 233
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.