Skip to main content

CVE-2025-2146: CWE-787: Out-of-bounds Write in Canon Inc. Satera MF656Cdw

Critical
VulnerabilityCVE-2025-2146cvecve-2025-2146cwe-787
Published: Sun May 25 2025 (05/25/2025, 23:36:36 UTC)
Source: CVE Database V5
Vendor/Project: Canon Inc.
Product: Satera MF656Cdw

Description

Buffer overflow in WebService Authentication processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw/Satera MF551dw/Satera MF457dw firmware v05.07 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw/imageCLASS MF455dw/imageCLASS MF453dw/imageCLASS MF452dw/imageCLASS MF451dw/imageCLASS LBP237dw/imageCLASS LBP236dw/imageCLASS X MF1238 II/imageCLASS X MF1643i II/imageCLASS X MF1643iF II/imageCLASS X LBP1238 II firmware v05.07 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw/i-SENSYS MF553dw/i-SENSYS MF552dw/i-SENSYS MF455dw/i-SENSYS MF453dw/i-SENSYS LBP236dw/i-SENSYS LBP233dw/imageRUNNER 1643iF II/imageRUNNER 1643i II/i-SENSYS X 1238iF II/i-SENSYS X 1238i II/i-SENSYS X 1238P II/i-SENSYS X 1238Pr II firmware v05.07 and earlier sold in Europe.

AI-Powered Analysis

AILast updated: 07/11/2025, 11:03:01 UTC

Technical Analysis

CVE-2025-2146 is a critical buffer overflow vulnerability (CWE-787) found in the WebService Authentication processing component of multiple Canon multifunction and laser printers, including the Satera MF656Cdw and various Color imageCLASS and i-SENSYS models. This vulnerability affects firmware versions 05.07 and earlier. The flaw allows an unauthenticated attacker with network access to the affected device to trigger an out-of-bounds write condition. Exploitation can lead to the printer becoming unresponsive (denial of service) or, more severely, enable arbitrary code execution on the device. The vulnerability is remotely exploitable without requiring user interaction or privileges, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact spans confidentiality, integrity, and availability, as attackers could potentially execute malicious code to intercept print jobs, manipulate device settings, or disrupt printing services. The vulnerability is present in a broad range of Canon printers sold in Japan, the US, and Europe, with the European affected models including i-SENSYS and imageCLASS series. No public exploits are currently known in the wild, but the high CVSS score of 9.8 underscores the criticality and ease of exploitation. The lack of available patches at the time of publication increases the urgency for mitigation. This vulnerability highlights the risks associated with network-exposed printer management interfaces and the importance of timely firmware updates and network segmentation for such devices.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread deployment of affected Canon printer models in office environments. Successful exploitation could lead to complete compromise of the printer, enabling attackers to disrupt printing operations (impacting availability), intercept or alter sensitive printed documents (impacting confidentiality and integrity), and potentially use the compromised printer as a foothold for lateral movement within corporate networks. Given that these printers are often connected to internal networks and sometimes exposed to less secure network segments, the risk of exploitation is heightened. Critical business functions relying on printing, such as document handling, invoicing, and confidential communications, could be severely impacted. Additionally, the ability to execute arbitrary code could allow attackers to implant persistent malware or pivot to other critical systems, amplifying the threat to organizational cybersecurity posture.

Mitigation Recommendations

1. Immediate network segmentation: Isolate affected printers on dedicated VLANs or network segments with strict access controls to limit exposure to untrusted networks and reduce attack surface. 2. Access control: Restrict network access to printer management interfaces to authorized personnel and trusted IP ranges only, using firewalls or access control lists. 3. Disable unnecessary services: If possible, disable WebService Authentication or related network services on the printers until patches are available. 4. Monitor network traffic: Implement network monitoring and intrusion detection systems to detect anomalous activity targeting printer devices. 5. Firmware updates: Closely monitor Canon’s advisories for patches addressing CVE-2025-2146 and apply updates promptly once released. 6. Incident response readiness: Prepare to isolate or remove affected devices quickly if exploitation is suspected to prevent lateral movement. 7. Vendor engagement: Engage with Canon support channels to obtain any available interim mitigations or beta patches. 8. Inventory and asset management: Maintain an accurate inventory of all affected printer models and firmware versions deployed within the organization to prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Canon
Date Reserved
2025-03-10T04:32:48.049Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835ae14182aa0cae20fa1a0

Added to database: 5/27/2025, 12:20:36 PM

Last enriched: 7/11/2025, 11:03:01 AM

Last updated: 8/12/2025, 1:09:18 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats