CVE-2025-9903
📋 TL;DR
This CVE describes an out-of-bounds write vulnerability in multiple Canon printer drivers that could allow an attacker to execute arbitrary code or cause a denial of service. The vulnerability affects users of Canon production printers, office printers, small office multifunction printers, laser printers, and their associated drivers. Attackers could exploit this by sending specially crafted print jobs to vulnerable systems.
💻 Affected Systems
- Generic Plus PCL6 Printer Driver
- Generic Plus UFR II Printer Driver
- Generic Plus LIPS4 Printer Driver
- Generic Plus LIPSLX Printer Driver
- Generic Plus PS Printer Driver
- UFRII LT Printer Driver
- CARPS2 Printer Driver
- Generic FAX Driver
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with SYSTEM/root privileges leading to complete system compromise, lateral movement, and data exfiltration.
Likely Case
Local privilege escalation or denial of service through driver crashes, potentially disrupting printing services.
If Mitigated
Limited impact with proper network segmentation and print job filtering, potentially only causing application crashes.
🎯 Exploit Status
Exploitation requires ability to send print jobs to vulnerable systems. No public exploits known at time of advisory.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Canon advisory for specific fixed driver versions
Vendor Advisory: https://psirt.canon/advisory-information/cp2025-005/
Restart Required: No
Instructions:
1. Visit Canon support website for your region. 2. Identify your printer model and current driver version. 3. Download and install the latest driver version from Canon. 4. Verify installation completes successfully.
🔧 Temporary Workarounds
Network Segmentation
allIsolate printers and print servers from untrusted networks to limit attack surface.
Print Job Filtering
allImplement print job validation or use dedicated print servers with security controls.
🧯 If You Can't Patch
- Disable affected printer drivers and use alternative printing methods if available
- Implement strict network access controls to limit who can send print jobs to vulnerable systems
🔍 How to Verify
Check if Vulnerable:
Check installed Canon printer driver versions against vulnerable versions listed in Canon advisory CP2025-005.
Check Version:
Windows: Check in Control Panel > Devices and Printers > Printer Properties > About. Or check installed programs list for Canon driver versions.
Verify Fix Applied:
Verify driver version matches or exceeds fixed version specified in Canon advisory after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual print job failures
- Printer driver crashes in system logs
- Multiple failed print attempts from single source
Network Indicators:
- Unusual print protocol traffic patterns
- Print jobs from unexpected sources
SIEM Query:
source="print_server" AND (event_id="Error" OR event_id="Crash") AND process_name="Canon*"
🔗 References
- https://canon.jp/support/support-info/250925vulnerability-response
- https://psirt.canon/advisory-information/cp2025-005/
- https://www.canon-europe.com/support/product-security/
- https://www.usa.canon.com/about-us/to-our-customers/cp2025-005-vulnerabilities-remediation-for-certain-printer-drivers-for-production-printers-office-small-office-multifunction-printers-laser-printers