CVE-2025-9903

5.9 MEDIUM

📋 TL;DR

This CVE describes an out-of-bounds write vulnerability in multiple Canon printer drivers that could allow an attacker to execute arbitrary code or cause a denial of service. The vulnerability affects users of Canon production printers, office printers, small office multifunction printers, laser printers, and their associated drivers. Attackers could exploit this by sending specially crafted print jobs to vulnerable systems.

💻 Affected Systems

Products:
  • Generic Plus PCL6 Printer Driver
  • Generic Plus UFR II Printer Driver
  • Generic Plus LIPS4 Printer Driver
  • Generic Plus LIPSLX Printer Driver
  • Generic Plus PS Printer Driver
  • UFRII LT Printer Driver
  • CARPS2 Printer Driver
  • Generic FAX Driver
Versions: Specific vulnerable versions not detailed in references; check Canon advisories for exact version ranges.
Operating Systems: Windows, Potentially other OS supported by Canon drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects drivers for various Canon printer models including production printers, office printers, and multifunction devices. Exact model list in Canon advisories.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/root privileges leading to complete system compromise, lateral movement, and data exfiltration.

🟠

Likely Case

Local privilege escalation or denial of service through driver crashes, potentially disrupting printing services.

🟢

If Mitigated

Limited impact with proper network segmentation and print job filtering, potentially only causing application crashes.

🌐 Internet-Facing: MEDIUM - Printers/drivers exposed to internet could be targeted, but exploitation requires specific print job delivery.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit via network printing protocols.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to send print jobs to vulnerable systems. No public exploits known at time of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Canon advisory for specific fixed driver versions

Vendor Advisory: https://psirt.canon/advisory-information/cp2025-005/

Restart Required: No

Instructions:

1. Visit Canon support website for your region. 2. Identify your printer model and current driver version. 3. Download and install the latest driver version from Canon. 4. Verify installation completes successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate printers and print servers from untrusted networks to limit attack surface.

Print Job Filtering

all

Implement print job validation or use dedicated print servers with security controls.

🧯 If You Can't Patch

  • Disable affected printer drivers and use alternative printing methods if available
  • Implement strict network access controls to limit who can send print jobs to vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Check installed Canon printer driver versions against vulnerable versions listed in Canon advisory CP2025-005.

Check Version:

Windows: Check in Control Panel > Devices and Printers > Printer Properties > About. Or check installed programs list for Canon driver versions.

Verify Fix Applied:

Verify driver version matches or exceeds fixed version specified in Canon advisory after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual print job failures
  • Printer driver crashes in system logs
  • Multiple failed print attempts from single source

Network Indicators:

  • Unusual print protocol traffic patterns
  • Print jobs from unexpected sources

SIEM Query:

source="print_server" AND (event_id="Error" OR event_id="Crash") AND process_name="Canon*"

🔗 References

📤 Share & Export