Canon U.S.A., Inc. has recently become aware of potential multiple buffer overflow vulnerabilities in the Canon Laser Printers/Inkjet Printers and Small Office Multifunctional Printers listed under Affected models below. If the product is connected directly to the internet without using a wired or Wi-Fi router, a third party could potentially execute arbitrary code or the product could be subjected to a Denial-of-Service (DoS) attack. In addition, there is the potential for arbitrary files to be installed by a third party due to improper authentication of the Remote User Interface (printer web portal).:
Problems During Initial Registration of System Administrators in Control Protocols
Improper authentication of the printer’s web portal
Installation of arbitrary files
imageCLASS D Series
imageCLASS MF Series
MF1643I II/MF1643IF II
MF262DW II/MF264DW II/MF267DW II/MF269DW II/MF269DW VP II
imageCLASS LBP Series
Note: If we determine that additional products could potentially be impacted by this matter, we will issue an updated Service Notice.
^ Models added on 09.07.23
^^ Models added on 09.12.23
Please proceed to https://www.usa.canon.com/support or click on the Affected model links above to navigate to the latest firmware. Once here, change the Type filter to Firmware, then download and install the latest version.
* For these models, the updated firmware will not be available on the Canon website; however it is recommended to use the Firmware Update feature on your device while connected to the network to update to the latest version.
Furthermore, if you have not done so already, we recommend that you set up a private IP address for products and create a network environment with a firewall or Wi-Fi router that can restrict network access.
In addition, please check “Regarding security for products connected to a network” in the URL below for other security measures that can be used with your Canon products.
Canon U.S.A., Inc.
Get personalized support via My Canon Account. Access your account, or create a new account, click here to get started.