The world’s popular printers manufacturer, Canon, disclosed three new buffer overflow vulnerabilities in multiple Canon printers. The vulnerabilities are assigned with CVE IDs CVE-2022-24672, CVE-2022-24673, and CVE-2022-24674 are High severity vulnerabilities with a CVSS score of 8.8. We recommend all Canon Printer users read this post as the successful exploitation of these buffer overflow vulnerabilities would allow attackers to perform arbitrary code execution, remote code execution, and Denial-of-Service (DoS) attacks on the vulnerable printer modules. Let’s see How to Fix the Three New Buffer Overflow Vulnerabilities in Canon Printers- (CVE-2022-24672, CVE-2022-24673, CVE-2022-24674) and secure your Canon printers from these buffer overflow vulnerabilities.
CVE-2022-24672: A Stack-based Buffer overflow in the CADM service of Canon imageCLASS MF644Cdw printers.
CVE-2022-24673: A Stack-based Buffer overflow in the implementation of the SLP protocol of Canon imageCLASS MF644Cdw printers.
CVE-2022-24674: A Stack-based Buffer overflow in the privet API of Canon imageCLASS MF644Cdw printers.
The CVE-2022-24672 vulnerability is due to the improper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer in the CADM service. An attacker can leverage this vulnerability to execute code in the service account context. These buffer overflow vulnerabilities would allow attackers to perform arbitrary code execution, remote code execution, and Denial-of-Service (DoS) attacks on affected installations of Canon imageCLASS MF644Cdw printer modules.
Associated CVE ID | CVE-2022-24672 |
Description | A Stack-based Buffer overflow in the privet API of Canon imageCLASS MF644Cdw printers. |
Associated ZDI ID | – |
CVSS Score | 8.8 High |
Vector | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Impact Score | – |
Exploitability Score | – |
Attack Vector (AV) | Adjacent Network |
Attack Complexity (AC) | Low |
Privilege Required (PR) | None |
User Interaction (UI) | None |
Scope | Unchanged |
Confidentiality (C) | High |
Integrity (I) | High |
availability (a) | High |
The CVE-2022-24673 vulnerability is due to the improper validation of the length of user-supplied data before copying it to a fixed-length heap-based buffer in the implementation of the SLP protocol. An attacker can leverage this vulnerability to execute code in the context of root. These buffer overflow vulnerabilities would allow attackers to perform arbitrary code execution, remote code execution, and Denial-of-Service (DoS) attacks on affected installations of Canon imageCLASS MF644Cdw printer modules.
Associated CVE ID | CVE-2022-24673 |
Description | A Stack-based Buffer overflow in the implementation of the SLP protocol of Canon imageCLASS MF644Cdw printers. |
Associated ZDI ID | – |
CVSS Score | 8.8 High |
Vector | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Impact Score | – |
Exploitability Score | – |
Attack Vector (AV) | Adjacent Network |
Attack Complexity (AC) | Low |
Privilege Required (PR) | None |
User Interaction (UI) | None |
Scope | Unchanged |
Confidentiality (C) | High |
Integrity (I) | High |
availability (a) | High |
The CVE-2022-24674 vulnerability is due to the improper validation of the length of user-supplied data before copying it to a fixed-length heap-based buffer in the privet API. An attacker can leverage this vulnerability to execute code in the service account context. These buffer overflow vulnerabilities would allow attackers to perform arbitrary code execution, remote code execution, and Denial-of-Service (DoS) attacks on affected installations of Canon imageCLASS MF644Cdw printer modules.
Associated CVE ID | CVE-2022-24674 |
Description | A Stack-based Buffer overflow in the privet API of Canon imageCLASS MF644Cdw printers. |
Associated ZDI ID | – |
CVSS Score | 8.8 High |
Vector | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Impact Score | – |
Exploitability Score | – |
Attack Vector (AV) | Adjacent Network |
Attack Complexity (AC) | Low |
Privilege Required (PR) | None |
User Interaction (UI) | None |
Scope | Unchanged |
Confidentiality (C) | High |
Integrity (I) | High |
availability (a) | High |
Advisory says that these buffer overflow vulnerabilities affect multiple Canon Laser Printers and Small Office Multifunctional Printer modules. The list would look like this :
imageCLASS MF Series
MF1127C
MF1238
MF445DW/MF448DW/MF449DW/MF543DW
MF632CDW/MF634CDW
MF641CW/MF642CDW/MF644CDW
MF731CDW/MF733CDW/MF735CDW
MF741CDW/MF743CDW/MF745CDW/MF746CDW
imageCLASS LBP Series
LBP1127C
LBP1238
LBP226DW/LBP227DW/LBP228DW
LBP612CDW
LBP622CDW/LBP623CDW
LBP654CDW
LBP664CDW
Note: The list may change as more investigations happen. Please visit this page for updated information.
The best solution to fix these buffer overflow vulnerabilities is upgrading the product’s firmware. If you are not in a position to upgrade the firmware anytime soon. It is good to disconnect the printer devices from the internet. If you really need the printer service to be used over the internet, configure the printer behind a firewall or VPN in a secured way. Click on these links to see how to upgrade the firmware. We recommend checking the product’s guide or contact support before upgrading the firmware.
Follow these best practices to secure your printer service on the internet:
Change the default password of the printer to a new complex password.
Enable the passwords for all admin and non-admin accounts.
Configure the printers behind the firewall and VPNs and implement network and access restrictions.
Use the encrypted network channel to connect the printers over the internet.
Disable the ports is not in use.
Set the product’s security function settings as strong as possible.
Keep the firmware version up to date.
Back up the data and configurations settings regularly.
We hope this post would help you know How to Fix the Three New Buffer Overflow Vulnerabilities in Canon Printers- (CVE-2022-24672, CVE-2022-24673, CVE-2022-24674). Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
You may also like these articles:
A Critical RCE Vulnerability in HP Printer Devices- Let's See How to Fix CVE-2022-28721(2)
Fix Multiple Critical Vulnerabilities In HP LaserJet Pro Printer Modules
How To Fix CVE-2022-26809- A Critical RCE Vulnerability In Windows RPC Runtime
How To Fix CVE-2022-20650- The New RCE Vulnerability In Cisco Switches?
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.