CVE-2025-0235

5.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code or cause denial of service by exploiting an out-of-bounds write during image rendering in Canon printer drivers. It affects systems using Generic PCL6 V4, Generic UFR II V4, or Generic LIPSLX V4 printer drivers. Attackers could potentially gain elevated privileges if they can trigger the vulnerability.

💻 Affected Systems

Products:
  • Generic PCL6 V4 Printer Driver
  • Generic UFR II V4 Printer Driver
  • Generic LIPSLX V4 Printer Driver
Versions: Version 4.0 through versions before the patched release
Operating Systems: Windows, Linux, macOS (if driver installed)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where these specific Canon printer drivers are installed. Print servers and workstations with these drivers are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/root privileges leading to complete system compromise, lateral movement, and data exfiltration.

🟠

Likely Case

Local privilege escalation or denial of service affecting printing functionality and potentially crashing the print spooler service.

🟢

If Mitigated

Limited impact with proper network segmentation and restricted printer driver installation rights.

🌐 Internet-Facing: LOW - Requires local access or network printing access; not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Exploitable through network printing or by users with local access to affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to send malicious print jobs or interact with print spooler. No public exploits available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Canon advisory for specific patched versions

Vendor Advisory: https://psirt.canon/advisory-information/cp2025-002/

Restart Required: Yes

Instructions:

1. Visit Canon's security advisory page
2. Download updated printer driver versions
3. Uninstall affected drivers
4. Install patched versions
5. Restart affected systems

🔧 Temporary Workarounds

Restrict Printer Driver Installation

windows

Limit who can install printer drivers to prevent vulnerable driver deployment

Group Policy: Computer Configuration > Policies > Administrative Templates > Printers > 'Allow non-administrators to install drivers for network printers' = Disabled

Network Segmentation

all

Isolate print servers and restrict access to print spooler services

Firewall rules: Block TCP port 9100, 515, 631 from untrusted networks

🧯 If You Can't Patch

  • Remove affected printer drivers and use alternative drivers
  • Implement strict access controls to print servers and disable unnecessary printing services

🔍 How to Verify

Check if Vulnerable:

Check installed printer drivers for affected Canon driver versions via Print Management console or driver management tools

Check Version:

Windows: Get-PrinterDriver | Select Name, DriverVersion; Linux: lpinfo -v and check driver versions

Verify Fix Applied:

Verify driver version matches patched version from Canon advisory and test printing functionality

📡 Detection & Monitoring

Log Indicators:

  • Print spooler crashes (Event ID 7031, 7034)
  • Unexpected print job submissions
  • Driver loading failures in system logs

Network Indicators:

  • Unusual print job traffic to port 9100/515/631
  • Multiple failed print jobs from single source

SIEM Query:

EventID=7031 OR EventID=7034 AND Source="Service Control Manager" AND ServiceName="Spooler"

🔗 References

📤 Share & Export