First published: Tue Jan 28 2025(Updated: )
Buffer overflow in CPCA font download processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.
Credit: f98c90f0-e9bd-4fa7-911b-51993f3571fd
Affected Software | Affected Version | How to fix |
---|---|---|
Canon Satera MF656Cdw | <05.04 | |
Canon Satera MF654Cdw | <05.04 | |
Canon Satera MF656Cdw | <05.04 | |
Canon Satera MF654Cdw | <05.04 | |
Canon Color imageCLASS MF653Cdw | <05.04 | |
canon Color imageCLASS MF652Cdw | <05.04 | |
canon Color imageCLASS LBP633Cdw | <05.04 | |
Canon Color imageCLASS LBP632Cdw | <05.04 | |
Canon i-SENSYS MF657Cdw | <05.04 | |
Canon i-SENSYS MF655Cdw | <05.04 | |
Canon i-SENSYS MF651Cdw | <05.04 | |
canon Color imageCLASS LBP633Cdw | <05.04 | |
Canon i-SENSYS LBP631Cdw | <05.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12647 has a critical severity level due to its potential to allow remote code execution or cause the affected printers to become unresponsive.
To fix CVE-2024-12647, update the firmware of the affected Canon printers to the latest version provided by Canon.
CVE-2024-12647 affects various Canon printers, including the Satera MF656Cdw and MF654Cdw models with firmware version 05.04 or lower.
CVE-2024-12647 can enable an attacker to execute arbitrary code or disrupt the functionality of the devices by exploiting a buffer overflow vulnerability.
There are indications that CVE-2024-12647 could be exploited, so immediate action is recommended to mitigate risks.