CVE-2024-12647

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in CPCA font download processing for Canon multifunction printers allows network attackers to crash devices or execute arbitrary code. Affected devices include Satera, imageCLASS, and i-SENSYS models sold in Japan, US, and Europe with firmware v05.04 and earlier.

💻 Affected Systems

Products:
  • Satera MF656Cdw
  • Satera MF654Cdw
  • Color imageCLASS MF656Cdw
  • Color imageCLASS MF654Cdw
  • Color imageCLASS MF653Cdw
  • Color imageCLASS MF652Cdw
  • Color imageCLASS LBP633Cdw
  • Color imageCLASS LBP632Cdw
  • i-SENSYS MF657Cdw
  • i-SENSYS MF655Cdw
  • i-SENSYS MF651Cdw
  • i-SENSYS LBP633Cdw
  • i-SENSYS LBP631Cdw
Versions: Firmware v05.04 and earlier
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Different model names for different regions: Japan (Satera), US (imageCLASS), Europe (i-SENSYS)

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/root privileges leading to complete device compromise, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Denial of service causing printer unresponsiveness and disruption of printing services.

🟢

If Mitigated

Limited to denial of service if network segmentation prevents attacker access.

🌐 Internet-Facing: MEDIUM - Printers directly exposed to internet could be exploited, but many are behind firewalls.
🏢 Internal Only: HIGH - Attackers on the same network segment can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Network-based exploitation without authentication. CVSS 9.8 indicates critical severity with low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware v05.05 or later

Vendor Advisory: https://psirt.canon/advisory-information/cp2025-001/

Restart Required: Yes

Instructions:

1. Download firmware update from Canon support site. 2. Upload firmware via printer web interface. 3. Apply update and restart printer.

🔧 Temporary Workarounds

Network segmentation

all

Isolate printers on separate VLAN with strict access controls

Disable unnecessary services

all

Disable CPCA font download service if not required

🧯 If You Can't Patch

  • Segment printers on isolated network with firewall rules blocking unnecessary inbound connections
  • Implement network monitoring for suspicious traffic to printer IPs on port 9100/tcp and other printing ports

🔍 How to Verify

Check if Vulnerable:

Check firmware version in printer web interface under Settings > Device Information

Check Version:

N/A - Use printer web interface or physical display

Verify Fix Applied:

Confirm firmware version is v05.05 or later in device information

📡 Detection & Monitoring

Log Indicators:

  • Printer crash/reboot logs
  • Unusual font download attempts in printer logs

Network Indicators:

  • Unusual traffic to printer port 9100/tcp
  • Malformed font download packets

SIEM Query:

source_ip=* dest_ip=printer_ip port=9100 AND (payload_size>normal OR malformed_packet)

🔗 References

📤 Share & Export