CVE-2025-7698
📋 TL;DR
This CVE describes an out-of-bounds read vulnerability in multiple Canon printer drivers. Attackers could exploit this to read sensitive memory contents, potentially exposing credentials or system information. Organizations using affected Canon printer drivers on Windows systems are vulnerable.
💻 Affected Systems
- Generic Plus PCL6 Printer Driver
- Generic Plus UFR II Printer Driver
- Generic Plus LIPS4 Printer Driver
- Generic Plus LIPSLX Printer Driver
- Generic Plus PS Printer Driver
- UFRII LT Printer Driver
- CARPS2 Printer Driver
- Generic FAX Driver
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Information disclosure leading to credential theft, privilege escalation, or system compromise through memory analysis
Likely Case
Application crash (denial of service) or limited information disclosure from adjacent memory
If Mitigated
Minimal impact with proper network segmentation and driver isolation
🎯 Exploit Status
Requires user interaction (printing malicious document) or network access to printer queue
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Updated drivers released September 2025
Vendor Advisory: https://psirt.canon/advisory-information/cp2025-005/
Restart Required: No
Instructions:
1. Visit Canon support site for your printer model. 2. Download latest driver version. 3. Uninstall current driver. 4. Install updated driver. 5. Test printing functionality.
🔧 Temporary Workarounds
Restrict printer access
allLimit who can send print jobs to vulnerable printers
Network segmentation
allIsolate printers and print servers from sensitive systems
🧯 If You Can't Patch
- Implement strict access controls on print queues
- Monitor for unusual print job patterns or driver crashes
🔍 How to Verify
Check if Vulnerable:
Check driver version in Windows Device Manager under Printers section
Check Version:
Get-PrinterDriver | Select-Object Name, DriverVersion (PowerShell)
Verify Fix Applied:
Verify driver version matches latest from Canon September 2025 updates
📡 Detection & Monitoring
Log Indicators:
- Printer driver crashes in Windows Event Log
- Unusual print job failures
Network Indicators:
- Unusual print job traffic patterns
- Multiple failed print attempts
SIEM Query:
EventID=1000 OR EventID=1001 Source='Print Service' OR DriverName contains 'Canon'
🔗 References
- https://canon.jp/support/support-info/250925vulnerability-response
- https://psirt.canon/advisory-information/cp2025-005/
- https://www.canon-europe.com/support/product-security/
- https://www.usa.canon.com/about-us/to-our-customers/cp2025-005-vulnerabilities-remediation-for-certain-printer-drivers-for-production-printers-office-small-office-multifunction-printers-laser-printers