HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

Critical Remote Code Execution in Canon imageCLASS MF654Cdw (CVE‑2025‑14235) Threatens Network‑Adjacent Printers

A critical out‑of‑bounds write in the TrueType‑font parser of Canon imageCLASS MF654Cdw printers (CVE‑2025‑14235) enables unauthenticated remote code execution. The vulnerability scores 8.8 on CVSS and can be leveraged to compromise internal networks, posing a serious supply‑chain risk for organizations that rely on Canon printing devices.

🛡️ LiveThreat™ Intelligence · 📅 March 17, 2026· 📰 zerodayinitiative.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
zerodayinitiative.com

Critical Remote Code Execution in Canon imageCLASS MF654Cdw (CVE‑2025‑14235) Threatens Network‑Adjacent Printers

What It Is – A newly disclosed out‑of‑bounds write in the TrueType‑font (TTF) parser of Canon’s imageCLASS MF654Cdw multi‑function printer enables unauthenticated attackers to execute arbitrary code on the device.

Exploitability – The flaw is publicly disclosed, a proof‑of‑concept was demonstrated at the Pwn2Own competition, and a vendor patch is already available. CVSS 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) classifies it as Critical.

Affected Products – Canon imageCLASS MF654Cdw (all firmware versions prior to the March 2026 security update).

TPRM Impact – Compromised printers can become footholds for lateral movement, exfiltrate printed documents, and serve as pivot points to internal networks, creating a supply‑chain risk for any organization that outsources its printing to Canon.

Recommended Actions

  • Deploy Canon’s March 2026 firmware update immediately.
  • Isolate network‑adjacent printers on a segmented VLAN.
  • Disable TTF font processing or restrict print jobs to trusted sources.
  • Conduct a rapid inventory of all Canon imageCLASS devices and verify patch status.
  • Monitor network traffic for anomalous outbound connections from printers.

Source: Zero Day Initiative Advisory – ZDI‑26‑206

📰 Original Source
http://www.zerodayinitiative.com/advisories/ZDI-26-206/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.