Canon Printer Flaw Enables Remote Code Execution

Researchers have uncovered a high-severity vulnerability (CVE-2025-1268) in Canon’s Generic Plus printer drivers that could allow attackers to execute arbitrary code remotely. The flaw, which received a concerning CVSS rating of 9.4, affects various Canon printers including production models, small office multifunction devices, and laser printers. This out-of-bounds vulnerability in Enhanced Metafile Recode processing can lead to memory corruption when handling image data conversion, potentially enabling system crashes, data leaks, or complete device compromise—especially in networked environments. Security experts warn that compromised printers could serve as entry points for broader network attacks, threatening network security, business continuity and compliance requirements. While Canon has promised updated drivers will be available through local sales representatives, one cybersecurity researcher suggests keeping printers isolated from networks via direct USB connections where practical to reduce potential attack surfaces.​​​​​​​​​​​​​​​​

*****
Written on