9.8
CRITICAL CVSS 3.1
CVE-2024-12649
Canon Small Office Multifunction Printers and Laser Printers Buffer Overflow Vulnerability
Description

Buffer overflow in XPS data font processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.

INFO

Published Date :

Jan. 28, 2025, 1:15 a.m.

Last Modified :

Jan. 26, 2026, 3:08 p.m.

Remotely Exploit :

Yes !

Source :

f98c90f0-e9bd-4fa7-911b-51993f3571fd
Affected Products

The following products are affected by CVE-2024-12649 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Canon mf1238_ii_firmware
2 Canon mf1643i_ii_firmware
3 Canon mf1643if_ii_firmware
4 Canon mf451dw_firmware
5 Canon mf452dw_firmware
6 Canon mf453dw_firmware
7 Canon mf455dw_firmware
8 Canon lbp1238_ii_firmware
9 Canon lbp236dw_firmware
10 Canon lbp237dw_firmware
11 Canon i-sensys_lbp633cdw_firmware
12 Canon mf1238_ii
13 Canon mf1643i_ii
14 Canon mf1643if_ii
15 Canon mf451dw
16 Canon mf452dw
17 Canon mf453dw
18 Canon mf455dw
19 Canon lbp1238_ii
20 Canon lbp236dw
21 Canon lbp237dw
22 Canon satera_mf656cdw_firmware
23 Canon satera_mf654cdw_firmware
24 Canon i-sensys_mf657cdw_firmware
25 Canon i-sensys_mf655cdw_firmware
26 Canon i-sensys_mf651cdw_firmware
27 Canon i-sensys_lbp631cdw_firmware
28 Canon mf465dw_firmware
29 Canon mf465dw
30 Canon mf462dw_firmware
31 Canon mf462dw
32 Canon mf656cdw_firmware
33 Canon mf656cdw
34 Canon mf654cdw_firmware
35 Canon mf654cdw
36 Canon mf653cdw_firmware
37 Canon mf653cdw
38 Canon mf652cw_firmware
39 Canon mf652cw
40 Canon mf1440_firmware
41 Canon mf1440
42 Canon lbp247dw_firmware
43 Canon lbp247dw
44 Canon lbp246dw_firmware
45 Canon lbp246dw
46 Canon lbp633cdw_firmware
47 Canon lbp633cdw
48 Canon lbp632cdw_firmware
49 Canon lbp632cdw
50 Canon lbp1440_firmware
51 Canon lbp1440
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL f98c90f0-e9bd-4fa7-911b-51993f3571fd
Solution
Update printer firmware to the latest version to fix buffer overflow vulnerabilities.
  • Update firmware for affected printer models.
  • Apply vendor patches immediately upon release.
  • Monitor vendor security advisories for updates.
References to Advisories, Solutions, and Tools
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-12649 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-12649 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-12649 vulnerability anywhere in the article.

  • Kaspersky
CVE-2025-55182 vulnerability in React and Next.js | Kaspersky official blog

On December 3, it became known about the coordinated elimination of the critical vulnerability CVE-2025-55182 (CVSSv3 — 10), which was found in React server components (RSC), as well as in a number of ... Read more

Published Date: Dec 04, 2025 (1 month, 3 weeks ago)
  • Kaspersky
CVE-2024-12649: vulnerability in the Canon TTF interpreter

These days, attackers probing an organization’s infrastructure rarely come across the luxury of a workstation without an EDR agent, so malicious actors are focusing on compromising servers, or various ... Read more

Published Date: Nov 12, 2025 (2 months, 2 weeks ago)

The following table lists the changes that have been made to the CVE-2024-12649 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Jan. 26, 2026

    Action Type Old Value New Value
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf455dw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf455dw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf453dw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf453dw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf452dw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf452dw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf451dw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf451dw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf465dw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf465dw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf462dw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf462dw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf656cdw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf656cdw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf654cdw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf654cdw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf653cdw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf653cdw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf652cw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf652cw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf1238_ii_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf1238_ii:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf1440_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf1440:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf1643if_ii_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf1643if_ii:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:mf1643i_ii_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:mf1643i_ii:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:lbp237dw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:lbp237dw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:lbp236dw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:lbp236dw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:lbp247dw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:lbp247dw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:lbp246dw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:lbp246dw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:lbp633cdw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:lbp633cdw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:lbp632cdw_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:lbp632cdw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:lbp1238_ii_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:lbp1238_ii:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:canon:lbp1440_firmware:*:*:*:*:*:*:*:* versions up to (including) 05.04 OR cpe:2.3:h:canon:lbp1440:-:*:*:*:*:*:*:*
    Added Reference Type Canon Inc.: https://canon.jp/support/support-info/250127vulnerability-response Types: Vendor Advisory
    Added Reference Type Canon Inc.: https://psirt.canon/advisory-information/cp2025-001/ Types: Vendor Advisory
    Added Reference Type Canon Inc.: https://www.canon-europe.com/support/product-security/#news Types: Vendor Advisory
    Added Reference Type Canon Inc.: https://www.usa.canon.com/support/canon-product-advisories/service-notice-regarding-vulnerability-measure-against-buffer-overflow-for-laser-printers-and-small-office-multifunctional-printers Types: Vendor Advisory
  • New CVE Received by f98c90f0-e9bd-4fa7-911b-51993f3571fd

    Jan. 28, 2025

    Action Type Old Value New Value
    Added Description Buffer overflow in XPS data font processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-787
    Added Reference https://canon.jp/support/support-info/250127vulnerability-response
    Added Reference https://psirt.canon/advisory-information/cp2025-001/
    Added Reference https://www.canon-europe.com/support/product-security/#news
    Added Reference https://www.usa.canon.com/support/canon-product-advisories/service-notice-regarding-vulnerability-measure-against-buffer-overflow-for-laser-printers-and-small-office-multifunctional-printers
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 9.8
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact