Buffer Overflow in Canon Multifunction and Laser Printers
CVE-2024-12647

9.8CRITICAL

Key Information:

Vendor
Canon Inc.
Status
Satera Mf656cdw
Satera Mf654cdw
Color Imageclass Mf656cdw
Color Imageclass Mf654cdw
Vendor
CVE Published:
28 January 2025

What is CVE-2024-12647?

CVE-2024-12647 is a serious vulnerability affecting Canon’s Small Office Multifunction Printers and Laser Printers. This security issue arises from a buffer overflow in the CPCA font download processing, which can allow an attacker on the same network segment to exploit the affected devices. If successfully triggered, this vulnerability may cause the printers to become unresponsive or even allow arbitrary code execution. The implications of such a vulnerability are particularly alarming for organizations that rely on these devices for routine printing tasks, as it could compromise printer functionality and expose networks to further risks.

Technical Details

The vulnerability is classified as a buffer overflow, a common software flaw that occurs when data exceeds a buffer's storage capacity. In the case of CVE-2024-12647, the flaw is found in the processing of font downloads for a specific range of Canon printers, particularly those with firmware versions v05.04 and earlier. This exposure mainly affects models such as the Satera series in Japan and various Color imageCLASS and i-SENSYS models sold in the US and Europe. An attacker on the same network can exploit this vulnerability to manipulate the printer’s operations, leading to denial of service or unauthorized execution of code.

Potential Impact of CVE-2024-12647

  1. Device Unresponsiveness: The primary impact of exploiting this vulnerability is the potential for printers to become non-operational, disrupting business processes that rely on printing services.

  2. Arbitrary Code Execution: If an attacker is able to successfully exploit this vulnerability, they may execute arbitrary code on the affected device. This could lead to further compromise, allowing access to sensitive information or the broader network.

  3. Network Security Risks: Given that the vulnerability allows access from within the network, it raises significant concerns regarding overall network security. An exploited printer could be a foothold for attackers to launch further attacks against other devices within the organization.

Affected Version(s)

Color imageCLASS LBP632Cdw 05.04 and earlier

Color imageCLASS LBP633Cdw 05.04 and earlier

Color imageCLASS MF652Cdw 05.04 and earlier

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.