CVE-2023-6233

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in the SLP attribute request process of Canon multifunction printers and laser printers allows attackers on the same network segment to crash the device or execute arbitrary code. Affected devices include Satera, imageCLASS, and i-SENSYS series printers with firmware v03.07 and earlier, sold in Japan, US, and Europe.

💻 Affected Systems

Products:
  • Satera LBP670C Series
  • Satera MF750C Series
  • Color imageCLASS LBP674C
  • Color imageCLASS X LBP1333C
  • Color imageCLASS MF750C Series
  • Color imageCLASS X MF1333C Series
  • i-SENSYS LBP673Cdw
  • i-SENSYS C1333P
  • i-SENSYS MF750C Series
  • i-SENSYS C1333i Series
Versions: Firmware v03.07 and earlier
Operating Systems: Printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affected devices are region-specific: Japan, US, and Europe models only. Other regions may have different firmware versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full device compromise, allowing attackers to install persistent malware, steal print jobs, or pivot to other network systems.

🟠

Likely Case

Denial of service causing printer unresponsiveness, disrupting business operations and requiring physical reset or service.

🟢

If Mitigated

Limited impact if printers are isolated on separate VLANs with strict network segmentation and access controls.

🌐 Internet-Facing: LOW - Printers are typically not directly internet-facing, though misconfigured devices could be exposed.
🏢 Internal Only: HIGH - Attackers on the same network segment can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access but no authentication. SLP protocol is widely used for printer discovery, making this potentially easy to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware v03.08 or later

Vendor Advisory: https://psirt.canon/advisory-information/cp2024-001/

Restart Required: Yes

Instructions:

1. Identify affected printer models and current firmware version
2. Download updated firmware from Canon support website for your region
3. Upload firmware via printer web interface or USB
4. Reboot printer after installation completes

🔧 Temporary Workarounds

Disable SLP Service

all

Turn off the SLP (Service Location Protocol) service on affected printers to prevent exploitation.

Access printer web interface > Network Settings > Protocol Settings > Disable SLP

Network Segmentation

all

Isolate printers on separate VLANs with strict firewall rules limiting SLP traffic.

🧯 If You Can't Patch

  • Segment printers on isolated network VLANs with strict access controls
  • Implement network monitoring for SLP protocol anomalies and buffer overflow attempts

🔍 How to Verify

Check if Vulnerable:

Check printer firmware version via web interface: Settings > Device Information > Firmware Version

Check Version:

N/A - Use printer web interface or physical panel

Verify Fix Applied:

Confirm firmware version is v03.08 or later in printer settings

📡 Detection & Monitoring

Log Indicators:

  • Printer crash/reboot logs
  • SLP protocol errors in network device logs

Network Indicators:

  • Unusual SLP traffic to printers
  • Buffer overflow patterns in SLP packets

SIEM Query:

source="printer_logs" AND (event="crash" OR event="reboot") OR protocol="slp" AND payload_size>normal

🔗 References

📤 Share & Export