CVE-2025-9904

5.3 MEDIUM

📋 TL;DR

This CVE describes an unallocated memory access vulnerability in multiple Canon printer drivers that could allow an attacker to execute arbitrary code or cause a denial of service. The vulnerability affects users of Canon production printers, office printers, small office multifunction printers, laser printers, and related drivers. Successful exploitation requires an attacker to trick a user into opening a malicious document or printing to a vulnerable driver.

💻 Affected Systems

Products:
  • Generic Plus PCL6 Printer Driver
  • Generic Plus UFR II Printer Driver
  • Generic Plus LIPS4 Printer Driver
  • Generic Plus LIPSLX Printer Driver
  • Generic Plus PS Printer Driver
  • UFRII LT Printer Driver
  • CARPS2 Printer Driver
  • Generic FAX Driver
Versions: Specific versions not detailed in references; all versions before vendor patches are affected
Operating Systems: Windows, Linux, macOS (where drivers are installed)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Canon production printers, office printers, small office multifunction printers, and laser printers using these drivers. Vulnerability exists in the print processing component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the user running the print job, potentially leading to full system compromise.

🟠

Likely Case

Application crash or denial of service when processing malicious print jobs, disrupting printing functionality.

🟢

If Mitigated

Limited impact with proper network segmentation and user privilege restrictions, potentially only causing application instability.

🌐 Internet-Facing: LOW - Exploitation requires user interaction with malicious content or direct access to printing services.
🏢 Internal Only: MEDIUM - Internal users could be targeted via malicious documents or compromised internal systems attempting to exploit print services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious document or printing). No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated driver versions specified in Canon advisories

Vendor Advisory: https://psirt.canon/advisory-information/cp2025-005/

Restart Required: No

Instructions:

1. Visit Canon's security advisory page. 2. Identify your specific printer model and driver. 3. Download and install the updated driver version. 4. Verify installation and test printing functionality.

🔧 Temporary Workarounds

Restrict printing from untrusted sources

all

Implement policies to prevent printing of documents from unknown or untrusted sources

Network segmentation for printers

all

Isolate printers and print servers on separate network segments to limit attack surface

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized print jobs
  • Use network access controls to restrict which systems can communicate with print servers

🔍 How to Verify

Check if Vulnerable:

Check installed printer driver versions against Canon's patched versions list in advisory CP2025-005

Check Version:

Windows: Check printer properties in Devices and Printers; Linux/macOS: Check printer configuration or driver installation details

Verify Fix Applied:

Verify driver version matches or exceeds the patched version specified by Canon for your printer model

📡 Detection & Monitoring

Log Indicators:

  • Unexpected print job failures
  • Printer driver crash events in system logs
  • Multiple failed print attempts from single source

Network Indicators:

  • Unusual print job traffic patterns
  • Print jobs originating from unexpected sources

SIEM Query:

EventID=7031 OR EventID=1000 (Windows) with source containing print spooler or printer driver components

🔗 References

📤 Share & Export