Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9903: CWE-787: Out-of-bounds Write in Canon Inc. Generic Plus PCL6 Printer Driver

0
Medium
VulnerabilityCVE-2025-9903cvecve-2025-9903cwe-787
Published: Mon Sep 29 2025 (09/29/2025, 00:44:55 UTC)
Source: CVE Database V5
Vendor/Project: Canon Inc.
Product: Generic Plus PCL6 Printer Driver

Description

Out-of-bounds write vulnerabilities in print processing of Generic Plus PCL6 Printer Driver / Generic Plus UFR II Printer Driver / Generic Plus LIPS4 Printer Driver / Generic Plus LIPSLX Printer Driver / Generic Plus PS Printer Driver / UFRII LT Printer Driver / CARPS2 Printer Driver / Generic FAX Driver / LIPS4 Printer Driver / LIPSLX Printer Driver / UFR II Printer Driver / PS Printer Driver / PCL6 Printer Driver

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 08:43:54 UTC

Technical Analysis

CVE-2025-9903 is a medium-severity vulnerability classified as CWE-787 (Out-of-bounds Write) affecting Canon Inc.'s Generic Plus printer drivers, including PCL6, UFR II, LIPS4, LIPSLX, PS, and others, in versions 3.30 and earlier. The flaw occurs during print processing, where the driver improperly handles memory boundaries, leading to out-of-bounds write conditions. This can corrupt adjacent memory, potentially destabilizing the printer driver process or enabling an attacker to manipulate program flow. The vulnerability is exploitable remotely over the network without requiring privileges but does require user interaction, such as printing a malicious document. The CVSS 3.1 vector indicates a network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and low availability impact (A:L). While no known exploits are currently reported in the wild, the vulnerability could be leveraged to disrupt printing services or potentially execute arbitrary code if combined with other vulnerabilities. The affected drivers are widely used in various Canon printers, often in enterprise and office environments, making this a relevant threat for organizations relying on Canon printing solutions. The lack of available patches at the time of publication necessitates immediate mitigation and monitoring.

Potential Impact

The primary impact of CVE-2025-9903 is on the integrity and availability of printing services. An attacker exploiting this vulnerability could cause memory corruption in the printer driver, leading to crashes or denial of service, disrupting printing operations. In more advanced exploitation scenarios, it might allow execution of arbitrary code within the context of the printer driver, potentially enabling further compromise of the host system or lateral movement within a network. Although confidentiality is not directly impacted, disruption of printing services can affect business continuity, especially in environments heavily dependent on printing for operational workflows. Organizations with high volumes of print jobs or automated printing systems may experience operational delays or failures. The medium CVSS score reflects the combination of remote exploitability and required user interaction, limiting but not negating the threat. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.

Mitigation Recommendations

1. Apply patches or updates from Canon as soon as they become available to address CVE-2025-9903. Monitor Canon's official channels for release announcements. 2. Until patches are available, restrict network access to print servers and printers using these drivers to trusted users and systems only. 3. Implement strict print job validation and scanning to detect and block malicious or malformed print files that could trigger the vulnerability. 4. Educate users to avoid opening or printing documents from untrusted sources, as user interaction is required for exploitation. 5. Employ endpoint protection solutions capable of detecting anomalous behavior or crashes related to printer drivers. 6. Consider isolating print servers in segmented network zones to limit potential lateral movement if exploitation occurs. 7. Regularly audit and inventory printer drivers and firmware versions deployed across the organization to identify and prioritize vulnerable systems. 8. Monitor logs and alerts for unusual printer driver crashes or errors that may indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Canon
Date Reserved
2025-09-03T07:03:46.601Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d9de3249cfd472f57c8808

Added to database: 9/29/2025, 1:17:38 AM

Last enriched: 3/16/2026, 8:43:54 AM

Last updated: 3/26/2026, 10:17:40 AM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses