CVE-2025-7698

5.9 MEDIUM

📋 TL;DR

This CVE describes an out-of-bounds read vulnerability in multiple Canon printer drivers. Attackers could exploit this to read sensitive memory contents, potentially exposing credentials or system information. Organizations using affected Canon printer drivers on Windows systems are vulnerable.

💻 Affected Systems

Products:
  • Generic Plus PCL6 Printer Driver
  • Generic Plus UFR II Printer Driver
  • Generic Plus LIPS4 Printer Driver
  • Generic Plus LIPSLX Printer Driver
  • Generic Plus PS Printer Driver
  • UFRII LT Printer Driver
  • CARPS2 Printer Driver
  • Generic FAX Driver
Versions: Multiple versions prior to patches released September 2025
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects drivers for production printers, office/small office multifunction printers, laser printers

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure leading to credential theft, privilege escalation, or system compromise through memory analysis

🟠

Likely Case

Application crash (denial of service) or limited information disclosure from adjacent memory

🟢

If Mitigated

Minimal impact with proper network segmentation and driver isolation

🌐 Internet-Facing: LOW - Printer drivers typically not directly internet-exposed
🏢 Internal Only: MEDIUM - Requires local network access or user interaction to trigger via print jobs

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (printing malicious document) or network access to printer queue

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated drivers released September 2025

Vendor Advisory: https://psirt.canon/advisory-information/cp2025-005/

Restart Required: No

Instructions:

1. Visit Canon support site for your printer model. 2. Download latest driver version. 3. Uninstall current driver. 4. Install updated driver. 5. Test printing functionality.

🔧 Temporary Workarounds

Restrict printer access

all

Limit who can send print jobs to vulnerable printers

Network segmentation

all

Isolate printers and print servers from sensitive systems

🧯 If You Can't Patch

  • Implement strict access controls on print queues
  • Monitor for unusual print job patterns or driver crashes

🔍 How to Verify

Check if Vulnerable:

Check driver version in Windows Device Manager under Printers section

Check Version:

Get-PrinterDriver | Select-Object Name, DriverVersion (PowerShell)

Verify Fix Applied:

Verify driver version matches latest from Canon September 2025 updates

📡 Detection & Monitoring

Log Indicators:

  • Printer driver crashes in Windows Event Log
  • Unusual print job failures

Network Indicators:

  • Unusual print job traffic patterns
  • Multiple failed print attempts

SIEM Query:

EventID=1000 OR EventID=1001 Source='Print Service' OR DriverName contains 'Canon'

🔗 References

📤 Share & Export