CVE-2025-1268

9.4 CRITICAL

📋 TL;DR

This CVE describes an out-of-bounds write vulnerability in multiple Canon printer drivers that could allow an attacker to execute arbitrary code with system privileges. It affects users of Canon production printers, office multifunction printers, and laser printers. The vulnerability is triggered when processing EMF (Enhanced Metafile) files through the vulnerable drivers.

💻 Affected Systems

Products:
  • Generic Plus PCL6 Printer Driver
  • Generic Plus UFR II Printer Driver
  • Generic Plus LIPS4 Printer Driver
  • Generic Plus LIPSLX Printer Driver
  • Generic Plus PS Printer Driver
  • Generic FAX Printer Driver
  • UFRII LT Printer Driver
  • CARPS2 Printer Driver
  • PDF Driver
Versions: All versions prior to patches released in March 2025
Operating Systems: Windows, Linux, macOS (where applicable)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Canon production printers, office/small office multifunction printers, and laser printers. Users must have vulnerable drivers installed and process malicious EMF files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/root privileges leading to complete system compromise, data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or remote code execution if an attacker can deliver a malicious EMF file to a user with vulnerable drivers installed.

🟢

If Mitigated

Denial of service or application crash if exploit attempts are blocked by security controls.

🌐 Internet-Facing: MEDIUM - Requires user interaction (opening malicious file) but could be delivered via web downloads or email attachments.
🏢 Internal Only: HIGH - Internal users with vulnerable drivers are at significant risk from phishing attacks or malicious documents.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to process malicious EMF file. No public exploits available at disclosure time, but CVSS 9.4 suggests high exploitability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated drivers released March 2025

Vendor Advisory: https://psirt.canon/advisory-information/cp2025-003/

Restart Required: Yes

Instructions:

1. Visit Canon support website for your printer model. 2. Download and install the latest printer driver version. 3. Restart the system. 4. Verify installation through device manager or driver properties.

🔧 Temporary Workarounds

Restrict EMF file processing

windows

Block or restrict processing of EMF files through group policy or application control

Remove vulnerable drivers

windows

Uninstall affected Canon printer drivers if not essential

Control Panel > Programs > Uninstall affected Canon drivers

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized printer driver execution
  • Use network segmentation to isolate systems with vulnerable drivers from critical assets

🔍 How to Verify

Check if Vulnerable:

Check installed printer drivers in Control Panel > Devices and Printers > Printer Properties > Advanced tab for driver version

Check Version:

wmic printer get name, drivername, driverversion (Windows) or lpinfo -v (Linux)

Verify Fix Applied:

Verify driver version matches or exceeds March 2025 updates from Canon support site

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in printer spooler service
  • Unexpected EMF file processing events
  • Driver loading failures

Network Indicators:

  • Unusual outbound connections from print spooler
  • EMF file downloads to print servers

SIEM Query:

EventID=7031 OR EventID=1000 Source=spoolsv.exe OR ProcessName=spoolsv.exe

🔗 References

📤 Share & Export