TL;DR

A remote code execution vulnerability in Canon MF654Cdw printers allows unauthenticated attackers with network access to run malicious code, rated CVSS 8.8 by ZDI.

What happened

Buffer overflow in Canon's PJCC request parsing Vulnerability accessible without authentication

Why it matters for ops

Risk of unauthorized execution of arbitrary code on network-connected printers Potential for data exfiltration and operational disruption

Mitigation

  • Apply firmware updates from Canon
  • Isolate printers on dedicated networks
  • Monitor and restrict access to affected ports/services

Action items

  • Update printer firmware immediately
  • Review network segmentation practices
  • Implement logging and monitoring for suspicious activity

Detection IOCs

  • Unusual network traffic to port 9100
  • Unexpected requests to PJCC service

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-205/