CVE-2023-6229

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in the CPCA PDL Resource Download process of Canon multifunction printers and laser printers allows network attackers to crash devices or execute arbitrary code. Affected devices include Satera, imageCLASS, and i-SENSYS series sold in Japan, US, and Europe. This is a critical vulnerability with CVSS 9.8 affecting firmware v03.07 and earlier.

💻 Affected Systems

Products:
  • Satera LBP670C Series
  • Satera MF750C Series
  • Color imageCLASS LBP674C
  • Color imageCLASS X LBP1333C
  • Color imageCLASS MF750C Series
  • Color imageCLASS X MF1333C Series
  • i-SENSYS LBP673Cdw
  • i-SENSYS C1333P
  • i-SENSYS MF750C Series
  • i-SENSYS C1333i Series
Versions: v03.07 and earlier
Operating Systems: Printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices sold in specific regions (Japan, US, Europe) with affected firmware versions. Network access to printer management interface required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to other network systems, and persistent backdoor installation.

🟠

Likely Case

Device becoming unresponsive (DoS) or limited code execution for network reconnaissance and data exfiltration.

🟢

If Mitigated

Limited impact if devices are isolated on separate VLANs with strict network segmentation and access controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Buffer overflow in network service suggests relatively straightforward exploitation for attackers with network access to vulnerable devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware versions after v03.07

Vendor Advisory: https://psirt.canon/advisory-information/cp2024-001/

Restart Required: Yes

Instructions:

1. Identify affected printer models and current firmware version. 2. Download updated firmware from Canon support portal. 3. Upload firmware to printer via web interface or network management tool. 4. Apply update and restart printer. 5. Verify firmware version post-update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate printers on separate VLAN with strict firewall rules limiting access to necessary ports only.

Disable Unnecessary Services

all

Disable CPCA PDL Resource Download service if not required for business operations.

🧯 If You Can't Patch

  • Segment printers on isolated network with strict access controls and monitoring.
  • Implement network-based intrusion detection/prevention systems to block exploit attempts.

🔍 How to Verify

Check if Vulnerable:

Check printer firmware version via web interface (typically http://[printer-ip]) under Settings/Configuration/About pages.

Check Version:

N/A - Use printer web interface or network management tools

Verify Fix Applied:

Confirm firmware version is newer than v03.07 after applying update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network traffic to printer management ports (typically 9100, 631, 80, 443)
  • Printer crash/restart events in system logs
  • Failed firmware update attempts

Network Indicators:

  • Unusual TCP connections to printer ports from unexpected sources
  • Malformed PDL packets to printer services
  • Spike in network traffic to printer management interface

SIEM Query:

source_ip IN (printer_ips) AND (port IN (80,443,9100,631) AND bytes_sent > threshold) OR (event_type = 'device_restart' AND device_type = 'printer')

🔗 References

📤 Share & Export