Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14237: CWE-787: Out-of-bounds Write in Canon Inc. Satera LBP670C Series

0
Critical
VulnerabilityCVE-2025-14237cvecve-2025-14237cwe-787
Published: Thu Jan 15 2026 (01/15/2026, 23:40:35 UTC)
Source: CVE Database V5
Vendor/Project: Canon Inc.
Product: Satera LBP670C Series

Description

CVE-2025-14237 is a critical buffer overflow vulnerability in the XPS font parsing component of Canon's Satera LBP670C Series and related multifunction and laser printers. Exploitation requires no authentication or user interaction and can be triggered remotely over the network. Successful exploitation may lead to arbitrary code execution or cause the device to become unresponsive, impacting availability. The affected firmware versions are 06. 02 and earlier, with affected models sold in Japan, the US, and Europe. The vulnerability has a CVSS 4. 0 score of 9. 3, indicating high severity. No known exploits are currently reported in the wild. European organizations using affected Canon i-SENSYS and imageRUNNER models are at risk, especially in sectors relying heavily on networked printing infrastructure.

AI-Powered Analysis

AILast updated: 01/23/2026, 20:33:03 UTC

Technical Analysis

CVE-2025-14237 is a critical security vulnerability classified as CWE-787 (Out-of-bounds Write) affecting Canon's Satera LBP670C Series and several related multifunction and laser printer models, including i-SENSYS and imageRUNNER series sold in Europe, Japan, and the US. The flaw resides in the XPS font parsing functionality within the printer firmware versions 06.02 and earlier. Specifically, the vulnerability arises from improper bounds checking during font data processing, leading to a buffer overflow condition. An attacker positioned on the same network segment can craft malicious XPS print jobs containing specially designed font data to exploit this vulnerability. Exploitation does not require any authentication or user interaction, making it highly accessible to attackers with network access. The consequences of successful exploitation include arbitrary code execution on the printer, potentially allowing attackers to take full control of the device, or causing the device to crash and become unresponsive, thereby disrupting printing services. The vulnerability has been assigned a CVSS 4.0 base score of 9.3, reflecting its critical nature due to network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no active exploits have been reported in the wild, the widespread deployment of affected Canon printers in enterprise and office environments makes this a significant threat. The vulnerability affects multiple product lines with firmware versions 06.02 and earlier, emphasizing the need for prompt remediation. Given the criticality and ease of exploitation, attackers could leverage this flaw to establish footholds within corporate networks, pivot to other systems, or disrupt business operations by disabling printing infrastructure.

Potential Impact

For European organizations, the impact of CVE-2025-14237 is substantial. Many enterprises and public sector entities rely on Canon i-SENSYS and imageRUNNER printers for daily operations, making these devices critical infrastructure components. Exploitation could lead to unauthorized code execution on printers, enabling attackers to intercept or manipulate print jobs, exfiltrate sensitive documents, or use the compromised devices as a foothold for lateral movement within the network. Additionally, causing printers to become unresponsive disrupts business continuity, particularly in environments with high print volume or where printing is integral to workflows, such as legal, healthcare, and government sectors. The vulnerability's network-based attack vector and lack of authentication requirements increase the risk of exploitation from internal or nearby network attackers, including malicious insiders or compromised devices. Given the high CVSS score and the critical nature of the flaw, organizations face risks to confidentiality, integrity, and availability of their printing infrastructure and potentially broader network security. The absence of known exploits in the wild provides a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

To mitigate CVE-2025-14237, European organizations should immediately identify all affected Canon printer models running firmware version 06.02 or earlier. Although no official patch links are currently provided, organizations should monitor Canon's security advisories for firmware updates addressing this vulnerability and apply them promptly once available. In the interim, network segmentation should be enforced to isolate printers from general user networks, restricting access to trusted management stations only. Implement strict access controls on printer management interfaces and disable unnecessary network protocols or services on the devices. Employ network monitoring to detect anomalous print jobs or unusual traffic patterns targeting printers, which may indicate exploitation attempts. Consider deploying intrusion detection/prevention systems with signatures for suspicious XPS font parsing activities once available. Additionally, educate IT staff about this vulnerability to ensure rapid response to any signs of compromise. For environments where patching is delayed, temporarily disabling network printing or restricting print job sources to trusted devices can reduce exposure. Regularly audit printer firmware versions and configurations as part of vulnerability management programs to prevent similar risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Canon
Date Reserved
2025-12-07T23:53:44.786Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69697f1e7c726673b68c4162

Added to database: 1/15/2026, 11:58:22 PM

Last enriched: 1/23/2026, 8:33:03 PM

Last updated: 2/7/2026, 4:04:52 AM

Views: 195

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats