CVE-2023-0851

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in the CPCA Resource Download process of Canon multifunction printers allows network attackers to crash devices or execute arbitrary code. Affected devices include Satera, Color imageCLASS, and i-SENSYS models with firmware version 11.04 or earlier. This vulnerability affects devices sold in Japan, US, and Europe markets.

💻 Affected Systems

Products:
  • Satera LBP660C Series
  • Satera LBP620C Series
  • Satera MF740C Series
  • Satera MF640C Series
  • Color imageCLASS LBP660C Series
  • Color imageCLASS LBP620C Series
  • Color imageCLASS X LBP1127C
  • Color imageCLASS MF740C Series
  • Color imageCLASS MF640C Series
  • Color imageCLASS X MF1127C
  • i-SENSYS LBP660C Series
  • i-SENSYS LBP620C Series
  • i-SENSYS MF740C Series
  • i-SENSYS MF640C Series
  • i-SENSYS C1127P
  • i-SENSYS C1127iF
  • i-SENSYS C1127i
Versions: Firmware version 11.04 and earlier
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific regional variants sold in Japan, US, and Europe. CPCA (Canon Printer Communication Architecture) service must be enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to other network systems, and persistent backdoor installation.

🟠

Likely Case

Device becomes unresponsive or crashes, disrupting printing services and requiring manual reboot or firmware reinstallation.

🟢

If Mitigated

Limited to denial of service if network segmentation prevents exploitation attempts.

🌐 Internet-Facing: MEDIUM - While printers shouldn't be internet-facing, misconfigurations could expose them directly.
🏢 Internal Only: HIGH - Attackers on the local network segment can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Network-based exploitation without authentication. CVSS 9.8 indicates critical severity with low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version newer than 11.04

Vendor Advisory: https://psirt.canon/advisory-information/cp2023-001/

Restart Required: Yes

Instructions:

1. Visit Canon support website for your region. 2. Download latest firmware for your specific printer model. 3. Upload firmware via printer web interface or USB. 4. Reboot printer after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate printers on separate VLAN to limit attack surface

Disable CPCA Service

all

Turn off CPCA Resource Download functionality if not required

🧯 If You Can't Patch

  • Segment printers to isolated network with strict firewall rules
  • Implement network monitoring for unusual printer communication patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version via printer web interface: Settings > Device Information > Firmware Version

Check Version:

Not applicable - check via printer web interface or physical display

Verify Fix Applied:

Confirm firmware version is newer than 11.04 and test CPCA functionality

📡 Detection & Monitoring

Log Indicators:

  • Printer crash/reboot logs
  • CPCA service failure messages
  • Unusual network traffic to printer port 8611/tcp

Network Indicators:

  • Large or malformed packets to printer port 8611
  • Unexpected outbound connections from printer

SIEM Query:

destination_port:8611 AND (packet_size > 1500 OR protocol_anomaly = true)

🔗 References

📤 Share & Export