Cameras Menu
Lenses Menu
Video Menu
Ink, Toner & Paper Menu
Office Menu
Deals Menu
Office Product Deals
Support Menu
Shipping and Handling
Free Standard Shipping & Handling on Cameras & Lenses
Offer valid January 1, 2026 at 12:00 AM EST through March 31, 2026 at 11:59 PM EST. Offer valid only on consumer camera and lens products available for sale through the Canon online store only. Offer not valid on bulk orders. Orders will be shipped to a street address in the 50 United States or the District of Columbia only. Free standard shipping and handling offer is a $5.99 to $15.99 Canon online store value. Offer subject to the Canon Terms of Sale. Dealers, distributors and other resellers are not eligible for this offer. Offer void where prohibited, taxed, or restricted.
Free Standard Shipping & Handling on all Ink & Toner
Offer valid January 1, 2026 at 12:00 AM EST through March 31, 2026 at 11:59 PM EST. Offer valid only on ink and toner available for sale through the Canon online store only. Offer not valid on bulk orders. Orders will be shipped to a street address in the 50 United States or the District of Columbia only. Free standard shipping and handling offer is a $5.99 to $15.99 Canon online store value. Offer subject to the Canon Terms of Sale. Dealers, distributors and other resellers are not eligible for this offer. Offer void where prohibited, taxed, or restricted.
CPA2026-051 – Remediation for OpenSSL Vulnerability Affecting IRIS XMailFetcher
March 23, 2026
Canon Inc.
Description:
IRIS, a Canon company, has identified that one of its products, IRIS XMailFetcher, utilizes a vulnerable version of OpenSSL in which a malicious user may supply a Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV). OpenSSL copies this IV into a fixed‑size stack buffer without validating its length, resulting in a stack buffer overflow. This vulnerability affects OpenSSL’s parsing of CMS AuthEnvelopedData and EnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES‑GCM.
The potential impacts of this vulnerability include:
- Denial of Service (DoS) due to application crashes
- Potential remote code execution, depending on platform mitigations
- No valid key material required by the attacker, as the stack buffer overflow occurs before authentication
Affected Versions:
IRIS XMailFetcher: Version 5.0.29 and earlier.
Remediation / Mitigation:
IRIS has released IRIS XMailFetcher version 5.0.30, a security update that addresses this vulnerability (CVE‑2025‑15467).
This release includes no additional changes or new features and is focused solely on resolving this issue.
Canon recommends updating to version 5.0.30 as soon as possible. If you require assistance with the update, please contact our support team.
The fix is available under “download center” and the communication can be found under “Technical News” in the IRIS Partner Portal, under the headline: “IRIS XMailFetcher 5.0.30 – CVE‑2025‑15467 Fix”.
Please note that IRIS resolved this issue by releasing the version 5.0.30 update on 19 February 2026.
As of the date of this notice, there have been no reports of this vulnerability being exploited. However, to enhance product security, we recommend that customers install the latest IRIS XMailFetcher version 5.0.30.
CVE / CVSS:
CVE-2025-15467: A stack buffer overflow vulnerability in OpenSSL affecting the parsing of CMS AuthEnvelopedData and EnvelopedData messages. CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score: 9.3.
Thanks for signing up!
The application has encountered an unknown error. Please try again in a few minutes!
By clicking Sign Up, you are opting to receive promotional, educational, e-commerce and product registration emails from Canon USA. You can update your preferences or unsubscribe at anytime.
Footer
ABOUT CANON
MYCANON
ORDER HELP
PRODUCT RESOURCES
Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or part without permission is prohibited.
| [+] FeedbackTo get the best possible experience using our website we recommend that you upgrade to a newer version of the web browser.
Just click an icon below to view the down load page: