CVE-2023-0855

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in the IPP number-up attribute processing of Canon multifunction printers allows network attackers to crash devices or execute arbitrary code. Affected devices include Satera, Color imageCLASS, and i-SENSYS series printers with firmware version 11.04 or earlier. This vulnerability affects devices sold in Japan, US, and Europe markets.

💻 Affected Systems

Products:
  • Satera LBP660C Series
  • Satera LBP620C Series
  • Satera MF740C Series
  • Satera MF640C Series
  • Color imageCLASS LBP660C Series
  • Color imageCLASS LBP620C Series
  • Color imageCLASS X LBP1127C
  • Color imageCLASS MF740C Series
  • Color imageCLASS MF640C Series
  • Color imageCLASS X MF1127C
  • i-SENSYS LBP660C Series
  • i-SENSYS LBP620C Series
  • i-SENSYS MF740C Series
  • i-SENSYS MF640C Series
  • i-SENSYS C1127P
  • i-SENSYS C1127iF
  • i-SENSYS C1127i
Versions: Firmware version 11.04 and earlier
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific regional models sold in Japan, US, and Europe markets only.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral network movement, and persistent access to connected networks.

🟠

Likely Case

Denial of service causing printer unresponsiveness and disruption of printing services.

🟢

If Mitigated

Limited impact if printers are isolated on separate VLANs with strict network segmentation.

🌐 Internet-Facing: MEDIUM - While printers shouldn't be internet-facing, misconfigurations could expose them.
🏢 Internal Only: HIGH - Attackers on the local network segment can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the printer's IPP service (typically port 631).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version newer than 11.04

Vendor Advisory: https://psirt.canon/advisory-information/cp2023-001/

Restart Required: Yes

Instructions:

1. Visit Canon support website for your region. 2. Download latest firmware for your specific printer model. 3. Follow manufacturer's firmware update procedure. 4. Verify firmware version after update.

🔧 Temporary Workarounds

Disable IPP service

all

Disable Internet Printing Protocol service if not required for operations.

Network segmentation

all

Place printers on isolated VLAN with restricted access.

🧯 If You Can't Patch

  • Implement strict network access controls to limit printer access to authorized users only.
  • Monitor network traffic to printer IPP ports (typically 631) for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check printer firmware version via web interface or control panel. Navigate to Settings > Device Information > Firmware Version.

Check Version:

Check via printer web interface or use SNMP query: snmpget -v2c -c community_string printer_ip .1.3.6.1.2.1.25.6.3.1.2

Verify Fix Applied:

Verify firmware version is newer than 11.04 after update.

📡 Detection & Monitoring

Log Indicators:

  • Printer crash/reboot logs
  • IPP service error messages
  • Unusual print job submissions

Network Indicators:

  • Unusual traffic to printer port 631
  • Large IPP packets
  • Multiple failed IPP connections

SIEM Query:

source="printer_logs" AND ("crash" OR "reboot" OR "IPP error") OR dest_port=631 AND (packet_size>threshold OR rate>threshold)

🔗 References

📤 Share & Export