- Consolidate printer safety under a single supplier can save time, but not without risk of integration
- The new cannon security subscription comes just when its printer drivers face critical exposure to vulnerability
- Root access to the gunwaper allegedly sold online in the middle of the new launch of the company protection service
The lines between traditional equipment suppliers and cybersecurity suppliers are starting to blur while printers brands enter the field of cybersecurity, but pirates can always use your sales printer as an easy background door in your business network.
Canon, long associated with office cameras and printing equipment, now offers a cybersecurity subscription on several levels aimed at protecting devices, documents and termination point data.
The offer includes two levels: improved and premium – The first covers the bases such as firmware updates and data backup, while the second introduces proactive monitoring, threat detection and rapid recovery of devices.
Canon security concerns
The launch closely follows the heels of serious safety problems linked to the printed infrastructure of Canon, including the high severity driver vulnerabilities and a possible violation of the network announced on the underground forums.
Only a few days before the announcement of the new subscription service, Microsoft’s offensive security team revealed a critical vulnerability, CVE-2025-1268, affecting Canon printer pilots.
The fault, which marks 9.4 on the CVSS scale, could allow attackers to stop printing or execute arbitrary code under certain conditions.
Canon has issued opinions and urged users to update vulnerable drivers, in particular those related to several production and office printer models.
Although the fix is essential, the persistence of these defects highlights the larger risks than poorly secure printed infrastructure can pose.
Adding to this discomfort, Canon would have been the subject of underground lists offering access to the root level to its internal firewall systems.
Although the company has not confirmed such a violation, security analysts continue to monitor complaints traveling on the Dark Putporting web forums to provide access to attackers to create deadlines or move laterally in the business network
In this context, the new cannon subscription security services can be considered both as a reputation risk and an attempt to reposition themselves as a printer supplier.
Although these services resemble terminal protection platform features (EPP), they focus only on the environment of the cannon apparatus.
The question of whether this strategy is gaining ground depends more than the execution of Canon, because there is still a lot of skepticism with regard to traditional equipment companies occupying roles generally reserved for antivirus and cybersecurity suppliers.
For companies managing large fleets of printed devices, consolidation of protection via the equipment supplier can offer convenience, but it raises questions about scope, integration and surveillance.
If others in the equipment sector are starting to offer similar subscriptions, the market could see a progressive expansion of what constitutes EPP.
Via the week of news and cybersecurity security