ARTICLE AD BOX
The Microsoft Offensive Research and Security Engineering (MORSE) squad has identified a important information vulnerability wrong a scope of Canon printer drivers, threatening users crossed various sectors. This vulnerability could reportedly let malicious actors to discuss printing operations and, successful terrible cases, execute arbitrary codification connected affected systems.
The Issue
The issue’s halfway lies wrong nan EMF Recode processing, a captious constituent of respective Canon printer drivers. Researchers astatine MORSE wished that earlier versions, specifically 3.12 and prior, of nan Generic Plus PCL6, UFR II, LIPS4, LIPSLX, and PS printer drivers are susceptible to an out-of-bounds vulnerability.
The Common Vulnerability Scoring System (CVSS) v3.1 has assigned this vulnerability, tracked arsenic CVE-2025-1268, a guidelines people of 9.4, indicating a high-severity risk, fixed its debased onslaught complexity, nan absence of required privileges aliases personification interaction, and nan imaginable for high-impact discuss of confidentiality.
The Out-of-Bounds Vulnerability
This flaw occurs erstwhile a programme attempts to entree representation extracurricular of an assigned buffer, creating an opening for attackers to inject and execute malicious code. It fundamentally allows for representation corruption during EMF Recode processing, which malicious applications tin leverage to insert and execute their ain code.
This vulnerability is peculiarly concerning owed to its imaginable usage successful “Bring Your Own Vulnerable Driver” (BYOVD) attacks, a method progressively favoured by threat actors to summation elevated privileges and bypass information measures. BYOVD attacks utilization legitimate, yet vulnerable, drivers to execute malicious code, making this Canon driver flaw a superior risk.
The affected drivers are utilized successful a assortment of Canon printers, including accumulation models, agency and home-office multifunction printers, and laser printers. If a malicious exertion processes a people occupation done these susceptible drivers, attackers could summation unauthorized access, disrupting people occupation failures or, much critically, executing codification that could lead to information breaches aliases strategy control.
Canon’s Remediation and User Recommendations
Canon has acknowledged nan rumor and has committed to releasing updated printer drivers to reside it. These patches will beryllium made disposable done nan websites of section Canon income representatives. Users are powerfully advised to promptly download and instal nan latest versions of these drivers to mitigate nan consequence of exploitation. Implementing web segmentation to isolate captious systems and deploying Endpoint Detection and Response (EDR) solutions to show endpoint activity are besides powerfully recommended.