CVE-2023-6231

9.8 CRITICAL

📋 TL;DR

A critical buffer overflow vulnerability in the WSD probe request process of Canon multifunction printers allows attackers on the same network segment to crash affected devices or execute arbitrary code with high privileges. This affects specific Canon printer models sold in Japan, US, and Europe. The vulnerability requires no authentication and has a CVSS score of 9.8.

💻 Affected Systems

Products:
  • Satera LBP670C Series
  • Satera MF750C Series
  • Color imageCLASS LBP674C
  • Color imageCLASS X LBP1333C
  • Color imageCLASS MF750C Series
  • Color imageCLASS X MF1333C Series
  • i-SENSYS LBP673Cdw
  • i-SENSYS C1333P
  • i-SENSYS MF750C Series
  • i-SENSYS C1333i Series
Versions: Firmware v03.07 and earlier
Operating Systems: Printer firmware only
Default Config Vulnerable: ⚠️ Yes
Notes: Affected models vary by region: Japan, US, and Europe have different model names for essentially the same hardware. WSD (Web Services on Devices) protocol must be enabled (typically default).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/root privileges leading to complete device compromise, lateral movement to other network systems, and persistent backdoor installation.

🟠

Likely Case

Denial of service causing printers to become unresponsive, disrupting business operations and requiring physical restart or firmware reinstallation.

🟢

If Mitigated

Limited impact if printers are isolated on separate VLANs with strict network segmentation and access controls.

🌐 Internet-Facing: LOW (Printers should never be directly internet-facing; vulnerability requires network segment access)
🏢 Internal Only: HIGH (Attackers on internal network can exploit without authentication)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

No authentication required, exploit likely involves sending specially crafted WSD probe requests. Technical details not publicly available but buffer overflow in network service suggests straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware v03.08 or later

Vendor Advisory: https://psirt.canon/advisory-information/cp2024-001/

Restart Required: Yes

Instructions:

1. Identify affected printer models and current firmware version. 2. Download firmware update from Canon support portal for your region. 3. Upload firmware via printer web interface or USB. 4. Apply update and restart printer. 5. Verify firmware version is v03.08 or higher.

🔧 Temporary Workarounds

Disable WSD Protocol

all

Disable Web Services on Devices (WSD) protocol to prevent exploitation via network.

Access printer web interface -> Network Settings -> TCP/IP Settings -> Disable WSD

Network Segmentation

all

Isolate printers on separate VLAN with strict firewall rules.

Configure switch: vlan 10, name Printer-VLAN
Add firewall rule: deny all to printer subnet except management IPs

🧯 If You Can't Patch

  • Segment printers on isolated network VLAN with strict access controls
  • Disable WSD protocol and use alternative printing protocols like IPP or LPD

🔍 How to Verify

Check if Vulnerable:

Check printer firmware version via web interface (Settings -> Device Information) or printed configuration page. If firmware is v03.07 or earlier and WSD is enabled, device is vulnerable.

Check Version:

curl -s http://printer-ip/ or check printer web interface manually

Verify Fix Applied:

Confirm firmware version is v03.08 or higher via printer web interface or configuration page.

📡 Detection & Monitoring

Log Indicators:

  • Printer crash/restart logs
  • Unusual WSD protocol traffic spikes
  • Failed firmware update attempts

Network Indicators:

  • Unusual WSD probe requests to printer IPs
  • Traffic patterns matching buffer overflow attempts

SIEM Query:

source="network_firewall" dest_ip="printer_subnet" protocol="WSD" AND (packet_size>normal OR pattern="malformed")

🔗 References

📤 Share & Export