Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1585: CWE-428: Unquoted Search Path or Element in Canon Inc. IJ Scan Utility

0
High
VulnerabilityCVE-2026-1585cvecve-2026-1585cwe-428
Published: Thu Feb 26 2026 (02/26/2026, 23:39:13 UTC)
Source: CVE Database V5
Vendor/Project: Canon Inc.
Product: IJ Scan Utility

Description

An unquoted Windows service executable path vulnerability in IJ Scan Utility for Windows versions 1.1.2 through 1.5.0 may allow a local attacker to execute a malicious file with the privileges of the affected service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:27:38 UTC

Technical Analysis

CVE-2026-1585 is a vulnerability classified under CWE-428, which pertains to unquoted search path or element issues in Windows services. The affected product is Canon Inc.'s IJ Scan Utility for Windows, versions 1.1.2 through 1.5.0. The vulnerability arises because the executable path for a Windows service is not enclosed in quotes, allowing Windows to incorrectly parse the path if it contains spaces. This misinterpretation can be exploited by a local attacker who places a malicious executable in a directory path that is searched before the legitimate executable, causing the malicious code to run with the service's privileges. Since the service runs with high privileges, this can lead to privilege escalation, allowing the attacker to execute arbitrary code with elevated rights. The CVSS 4.0 base score is 8.4, indicating high severity, with attack vector local, low attack complexity, no authentication required, no user interaction, and high impact on confidentiality, integrity, and availability. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability requires local access with high privileges, making it a concern primarily for insider threats or attackers who have already compromised a low-privilege account and seek privilege escalation. The lack of quotes in the service executable path is a common Windows misconfiguration that can be mitigated by properly quoting paths or correcting service configurations.

Potential Impact

The potential impact of CVE-2026-1585 is significant for organizations using the affected IJ Scan Utility versions on Windows. Successful exploitation allows a local attacker to escalate privileges to those of the vulnerable service, which typically runs with high system privileges. This can lead to full system compromise, unauthorized access to sensitive data, installation of persistent malware, and disruption of scanning services. In environments where IJ Scan Utility is widely deployed, such as corporate offices, government agencies, and managed print services, this vulnerability could be leveraged to gain footholds for lateral movement or data exfiltration. Although exploitation requires local access with elevated privileges, the vulnerability increases risk from insider threats or attackers who have already breached perimeter defenses. The absence of a patch and known exploits means organizations must act proactively to mitigate risk. The vulnerability affects confidentiality, integrity, and availability of affected systems, potentially impacting business operations and compliance with data protection regulations.

Mitigation Recommendations

To mitigate CVE-2026-1585, organizations should take the following specific actions: 1) Restrict local administrative access to only trusted personnel to reduce the risk of local privilege escalation. 2) Audit and review the service executable paths for the IJ Scan Utility and other Windows services to ensure paths are properly quoted and do not contain spaces that could be exploited. 3) Implement application whitelisting to prevent unauthorized executables from running in directories searched by Windows services. 4) Monitor file system locations referenced in the service path for unauthorized or suspicious files that could be used to exploit the unquoted path. 5) Employ endpoint detection and response (EDR) solutions to detect anomalous process executions and privilege escalations. 6) Once Canon releases patches or updated versions addressing this vulnerability, apply them promptly. 7) Educate IT staff and users about the risks of local privilege escalation and enforce least privilege principles. 8) Consider isolating or limiting the use of the IJ Scan Utility on critical systems until a patch is available. These measures go beyond generic advice by focusing on service path validation, local access controls, and proactive monitoring specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Canon
Date Reserved
2026-01-29T05:17:57.309Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a0dd9b32ffcdb8a288c75e

Added to database: 2/26/2026, 11:56:11 PM

Last enriched: 3/6/2026, 9:27:38 PM

Last updated: 4/13/2026, 6:15:19 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses