CVE-2025-48499: Out-of-bounds Write in FUJIFILM Business Innovation Corp. DocuPrint CP225 w
Out-of-bounds write vulnerability exists in FUJIFILM Business Innovation MFPs. A specially crafted IPP (Internet Printing Protocol) or LPD (Line Printer Daemon) packet may cause a denial-of-service (DoS) condition on an affected MFP. Resetting the MFP is required to recover from the denial-of-service (DoS) condition.
AI Analysis
Technical Summary
CVE-2025-48499 is an out-of-bounds write vulnerability identified in FUJIFILM Business Innovation Corp.'s multifunction printers (MFPs), specifically the DocuPrint CP225 w model with firmware versions 01.23.02 and earlier. The vulnerability arises from improper handling of specially crafted packets sent via the Internet Printing Protocol (IPP) or Line Printer Daemon (LPD) protocol, both commonly used network printing protocols. An attacker can exploit this vulnerability remotely without requiring authentication or user interaction by sending maliciously crafted IPP or LPD packets to the affected device. Successful exploitation results in an out-of-bounds write condition, which leads to a denial-of-service (DoS) state where the printer becomes unresponsive and requires a manual reset to recover. The CVSS v3.1 base score is 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:L) with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could be leveraged by attackers to disrupt printing services in organizations relying on these devices, potentially impacting business operations that depend on printing capabilities.
Potential Impact
For European organizations, the primary impact of this vulnerability is service disruption due to denial-of-service conditions on affected FUJIFILM DocuPrint CP225 w MFPs. Organizations with critical printing needs—such as legal firms, government agencies, healthcare providers, and financial institutions—may experience operational delays or interruptions. While the vulnerability does not directly compromise data confidentiality or integrity, the loss of availability can hinder workflows, delay document processing, and reduce productivity. In environments where printing is integral to compliance or audit processes, such disruptions could indirectly affect regulatory adherence. Additionally, if attackers use this vulnerability as part of a broader attack campaign, it could serve as a vector for distraction or resource exhaustion. Given the lack of authentication requirements and ease of exploitation, attackers could launch DoS attacks from remote locations, including from outside the organization’s network if the devices are exposed to the internet or poorly segmented internal networks.
Mitigation Recommendations
European organizations should take proactive steps to mitigate this vulnerability beyond generic advice. First, conduct an immediate inventory of FUJIFILM DocuPrint CP225 w devices and verify firmware versions; prioritize upgrading devices to versions later than 01.23.02 once patches are released by the vendor. Until patches are available, restrict network access to these printers by implementing strict firewall rules that limit IPP and LPD protocol traffic to trusted management and user subnets only. Disable IPP and LPD services on devices if not required or replace them with more secure printing protocols. Employ network segmentation to isolate printers from critical infrastructure and sensitive data environments. Monitor network traffic for unusual or malformed IPP/LPD packets indicative of exploitation attempts. Establish incident response procedures to quickly reset affected devices and restore printing services. Engage with FUJIFILM Business Innovation Corp. for timely patch information and consider vendor support contracts to receive security updates promptly. Finally, educate IT staff about this vulnerability and ensure that printer firmware updates become part of regular patch management cycles.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-48499: Out-of-bounds Write in FUJIFILM Business Innovation Corp. DocuPrint CP225 w
Description
Out-of-bounds write vulnerability exists in FUJIFILM Business Innovation MFPs. A specially crafted IPP (Internet Printing Protocol) or LPD (Line Printer Daemon) packet may cause a denial-of-service (DoS) condition on an affected MFP. Resetting the MFP is required to recover from the denial-of-service (DoS) condition.
AI-Powered Analysis
Technical Analysis
CVE-2025-48499 is an out-of-bounds write vulnerability identified in FUJIFILM Business Innovation Corp.'s multifunction printers (MFPs), specifically the DocuPrint CP225 w model with firmware versions 01.23.02 and earlier. The vulnerability arises from improper handling of specially crafted packets sent via the Internet Printing Protocol (IPP) or Line Printer Daemon (LPD) protocol, both commonly used network printing protocols. An attacker can exploit this vulnerability remotely without requiring authentication or user interaction by sending maliciously crafted IPP or LPD packets to the affected device. Successful exploitation results in an out-of-bounds write condition, which leads to a denial-of-service (DoS) state where the printer becomes unresponsive and requires a manual reset to recover. The CVSS v3.1 base score is 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:L) with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could be leveraged by attackers to disrupt printing services in organizations relying on these devices, potentially impacting business operations that depend on printing capabilities.
Potential Impact
For European organizations, the primary impact of this vulnerability is service disruption due to denial-of-service conditions on affected FUJIFILM DocuPrint CP225 w MFPs. Organizations with critical printing needs—such as legal firms, government agencies, healthcare providers, and financial institutions—may experience operational delays or interruptions. While the vulnerability does not directly compromise data confidentiality or integrity, the loss of availability can hinder workflows, delay document processing, and reduce productivity. In environments where printing is integral to compliance or audit processes, such disruptions could indirectly affect regulatory adherence. Additionally, if attackers use this vulnerability as part of a broader attack campaign, it could serve as a vector for distraction or resource exhaustion. Given the lack of authentication requirements and ease of exploitation, attackers could launch DoS attacks from remote locations, including from outside the organization’s network if the devices are exposed to the internet or poorly segmented internal networks.
Mitigation Recommendations
European organizations should take proactive steps to mitigate this vulnerability beyond generic advice. First, conduct an immediate inventory of FUJIFILM DocuPrint CP225 w devices and verify firmware versions; prioritize upgrading devices to versions later than 01.23.02 once patches are released by the vendor. Until patches are available, restrict network access to these printers by implementing strict firewall rules that limit IPP and LPD protocol traffic to trusted management and user subnets only. Disable IPP and LPD services on devices if not required or replace them with more secure printing protocols. Employ network segmentation to isolate printers from critical infrastructure and sensitive data environments. Monitor network traffic for unusual or malformed IPP/LPD packets indicative of exploitation attempts. Establish incident response procedures to quickly reset affected devices and restore printing services. Engage with FUJIFILM Business Innovation Corp. for timely patch information and consider vendor support contracts to receive security updates promptly. Finally, educate IT staff about this vulnerability and ensure that printer firmware updates become part of regular patch management cycles.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-07-14T05:09:53.900Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689045f5ad5a09ad00de9ea9
Added to database: 8/4/2025, 5:32:37 AM
Last enriched: 8/4/2025, 5:47:43 AM
Last updated: 8/4/2025, 5:47:43 AM
Views: 2
Related Threats
CVE-2025-54962: CWE-434 Unrestricted Upload of File with Dangerous Type in thiagoralves OpenPLC_v3
MediumCVE-2025-20698: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8196, MT8391, MT8676, MT8678, MT8775, MT8786, MT8788E, MT8792, MT8796, MT8873, MT8883, MT8893
HighCVE-2025-20697: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2718, MT6761, MT6765, MT6768, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6889, MT6893, MT6897, MT6989, MT6991, MT8186, MT8196, MT8391, MT8678, MT8775, MT8786, MT8788E, MT8792, MT8796, MT8873, MT8883, MT8893
HighCVE-2025-20696: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6813, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6990, MT6991, MT8188, MT8196, MT8370, MT8390, MT8676
HighCVE-2025-54956: CWE-669 Incorrect Resource Transfer Between Spheres in r-lib gh
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.