Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FUJIFILM Printers Vulnerability Let Attackers Trigger DoS Condition

Posted on August 4, 2025August 4, 2025 By CWS

A vital safety vulnerability affecting a number of FUJIFILM printer fashions might enable attackers to set off denial-of-service (DoS) circumstances via malicious community packets. 

The vulnerability, tracked as CVE-2025-48499, was introduced on August 4, 2025, and impacts numerous DocuPrint and Apoes printer collection.

Key Takeaways1. CVE-2025-48499 permits attackers to crash FUJIFILM DocuPrint and Apeos printers.2. Printers freeze and require guide reboot, inflicting operational disruptions.3. Replace firmware instantly.

Out-of-Bounds Write Vulnerability

The vulnerability stems from an out-of-bounds write situation within the printer’s buffer reminiscence processing system, particularly when dealing with Web Printing Protocol (IPP) and Line Printer Daemon (LPD) packets. 

In keeping with FUJIFILM’s safety advisory, the problem happens in the course of the information writing course of when the prevailing logic fails to correctly validate information size parameters.

When specifically crafted packets of sure lengths are acquired, information could also be written past the designated buffer space, inflicting the printer to freeze and change into unresponsive. 

The vulnerability has been assigned a Frequent Weak point Enumeration (CWE-787) classification for out-of-bounds write circumstances and carries a CVSS v3.1 rating of 5.3 (Medium severity) and a CVSS v4.0 rating of 6.9 (Medium severity).

The affected fashions embrace a number of DocuPrint collection printers similar to CP225w, CP228w, CP115w, CP118w, CP116w, CP119w, CM225fw, CM228fw, CM115w, and CM118w, in addition to Apeos 2150N, 2350NDA, 2150ND, and 2150NDA fashions.

Every mannequin has particular affected firmware model ranges, with probably the most weak variations being these launched earlier than the newest safety patches.

The vulnerability was found by safety researchers Jia-Ju Bai, Rui-Nan Hu, Dong Zhang, and Zhen-Yu Guan from Beihang College’s College of Cyber Science and Expertise, highlighting the significance of educational safety analysis in figuring out enterprise vulnerabilities.

Threat FactorsDetailsAffected ProductsDocuPrint CP225w/CP228w, CP115w/CP118w/CP116w/CP119w, CM225fw/CM228fw, CM115w/CM118w, Apeos 2150N/2350NDA/2150ND/2150NDAImpactDenial-of-Service (DoS)Exploit PrerequisitesNetwork entry to printer, no authentication required, low assault complexity, no person interplay neededCVSS 3.1 Score5.3 (Medium)

Mitigations

FUJIFILM has launched up to date firmware variations to deal with the vulnerability throughout all affected printer fashions. 

The corporate recommends rapid firmware updates as the first countermeasure, with particular mounted variations obtainable for every printer collection, starting from model 01.11.00 to 01.24.00, relying on the mannequin.

As non permanent workarounds, FUJIFILM advises deploying affected units behind firewalls to stop exterior malicious assaults and suggests guide rebooting if printers change into unresponsive. 

Organizations utilizing affected FUJIFILM printers ought to prioritize firmware updates and implement community segmentation to attenuate potential assault vectors till patches may be deployed throughout their printer infrastructure.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Attackers, Condition, DoS, FUJIFILM, Printers, Trigger, Vulnerability

Post navigation

Previous Post: Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day
Next Post: Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally

Related Posts

Critical Dell Storage Manager Vulnerabilities Let Attackers Compromise System Cyber Security News
Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Cyber Security News
Predatory Sparrow Group Attacking Critical Infrastructure to Destroy Data and Cause Disruption Cyber Security News
CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server Cyber Security News
10 Best Secure Network As a Service for MSP Providers Cyber Security News
Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks
  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
  • Bob Flores, Former CTO of the CIA, Joins Brinker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks
  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
  • Bob Flores, Former CTO of the CIA, Joins Brinker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News