CVE-2024-0244

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in the CPCA PCFAX number process of Canon multifunction printers allows network attackers to crash devices or execute arbitrary code. Affected devices include Satera MF750C, Color imageCLASS MF750C/X MF1333C, and i-SENSYS MF754Cdw/C1333iF models with firmware v03.07 or earlier.

💻 Affected Systems

Products:
  • Satera MF750C Series
  • Color imageCLASS MF750C Series
  • Color imageCLASS X MF1333C
  • i-SENSYS MF754Cdw
  • i-SENSYS C1333iF
Versions: Firmware v03.07 and earlier
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Regional variations: Japan (Satera), US (imageCLASS), Europe (i-SENSYS). All affected models share the same vulnerable firmware.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/root privileges leading to complete device compromise, lateral movement, and data exfiltration.

🟠

Likely Case

Denial of service causing printer unresponsiveness and disruption of printing services.

🟢

If Mitigated

Limited impact if devices are isolated on separate VLANs with strict network segmentation.

🌐 Internet-Facing: HIGH if printers have public IP addresses or are exposed through VPN/remote access.
🏢 Internal Only: HIGH due to CVSS 9.8 score and network-accessible nature of printers within corporate networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Network-accessible without authentication. Buffer overflow in fax number processing suggests simple network packet crafting could trigger exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware newer than v03.07

Vendor Advisory: https://psirt.canon/advisory-information/cp2024-001/

Restart Required: Yes

Instructions:

1. Download latest firmware from Canon support portal. 2. Upload firmware via printer web interface. 3. Apply update. 4. Reboot printer. 5. Verify firmware version.

🔧 Temporary Workarounds

Network segmentation

all

Isolate printers on separate VLAN with strict firewall rules limiting access to necessary ports only.

Disable fax functionality

all

Turn off fax features if not required to remove vulnerable attack surface.

🧯 If You Can't Patch

  • Segment printers on isolated network with strict access controls
  • Implement network monitoring for anomalous traffic to printer IPs on port 9100/tcp and other printing ports

🔍 How to Verify

Check if Vulnerable:

Check firmware version via printer web interface: Settings > Device Information > Firmware Version

Check Version:

N/A - Use printer web interface or physical display panel

Verify Fix Applied:

Confirm firmware version is newer than v03.07 in printer web interface

📡 Detection & Monitoring

Log Indicators:

  • Printer crash/reboot logs
  • Unusual fax processing errors
  • Memory corruption warnings in device logs

Network Indicators:

  • Unusual traffic to printer port 9100/tcp
  • Malformed fax protocol packets
  • Multiple connection attempts to printer services

SIEM Query:

destination_ip IN [printer_ips] AND (port=9100 OR protocol="LPD" OR protocol="IPP") AND (payload_size > threshold OR pattern_match("buffer_overflow_patterns"))

🔗 References

📤 Share & Export