{"vulnerability": "CVE-2024-12647", "sightings": [{"uuid": "28d09772-9201-46e3-8c40-8fc201697bdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "MISP/ca7dfd4e-d0b5-4d10-8982-36d9f6e53c8e", "content": "", "creation_timestamp": "2025-09-01T13:53:38.000000Z"}, {"uuid": "aa900790-be30-4d07-876f-434875b40d43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lgsoanhcd22k", "content": "", "creation_timestamp": "2025-01-28T14:31:46.388833Z"}, {"uuid": "d7547861-b4cb-4e43-8640-c24f069d59ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-073/", "content": "", "creation_timestamp": "2025-01-31T05:00:00.000000Z"}, {"uuid": "6a9eba76-66e3-4e7d-b639-11b2d05f668b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://t.me/cvedetector/16566", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12647 - Small Office Multifunction Printers and Laser Printers Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-12647 \nPublished : Jan. 28, 2025, 1:15 a.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : Buffer overflow in CPCA font download processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T04:34:43.000000Z"}, {"uuid": "b6ee664d-d447-4460-8a69-edfba860a5f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgv3u254m22z", "content": "", "creation_timestamp": "2025-01-29T13:40:33.083457Z"}, {"uuid": "e1341090-9c7c-42fc-8216-8c3fa4c8e4ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgwl3kmook2s", "content": "", "creation_timestamp": "2025-01-30T03:45:55.066680Z"}, {"uuid": "3a56983d-fe0f-43c8-873f-9c2cbe44bc01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgrvbssl3c2q", "content": "", "creation_timestamp": "2025-01-28T07:04:58.744164Z"}, {"uuid": "1749ada2-e607-4a9e-9d77-fa70b607f85b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lgyhrueimy2x", "content": "", "creation_timestamp": "2025-01-30T21:52:03.578486Z"}, {"uuid": "2179e0b6-c7c1-4de8-a139-53e882d604e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgrbrjo3p42b", "content": "", "creation_timestamp": "2025-01-28T01:15:50.863500Z"}, {"uuid": "755552a8-dd78-433d-8da3-eefa44106289", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3224", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12647\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: Buffer overflow in CPCA font download processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.\n\ud83d\udccf Published: 2025-01-28T03:31:13Z\n\ud83d\udccf Modified: 2025-01-28T03:31:13Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-12647\n2. https://canon.jp/support/support-info/250127vulnerability-response\n3. https://psirt.canon/advisory-information/cp2025-001\n4. https://www.canon-europe.com/support/product-security/#news\n5. https://www.usa.canon.com/support/canon-product-advisories/service-notice-regarding-vulnerability-measure-against-buffer-overflow-for-laser-printers-and-small-office-multifunctional-printers", "creation_timestamp": "2025-01-28T04:09:26.000000Z"}, {"uuid": "3427457d-0fef-4940-832c-c6be9129ea71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "Telegram/j26DGJrd6hDEzfZlHw-97vNbm4BY4Cj8D1GznJ10D93Qv7eF", "content": "", "creation_timestamp": "2025-01-28T03:22:55.000000Z"}, {"uuid": "e36fffbc-5b35-4c79-8582-d1e46eead6d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-12647", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgwxhtxbcc2b", "content": "", "creation_timestamp": "2025-01-30T07:27:27.465377Z"}, {"uuid": "5c522419-eb26-4609-ae9c-8fbdf5cd905d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113903251527116478", "content": "", "creation_timestamp": "2025-01-28T00:54:49.208241Z"}, {"uuid": "ccd7d811-0088-44f6-b836-a7b29ce58178", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113903698571274333", "content": "", "creation_timestamp": "2025-01-28T02:48:30.689733Z"}, {"uuid": "050717e3-9b43-45f0-877d-0245ca7d4511", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lh3hs3wo6d2l", "content": "", "creation_timestamp": "2025-02-01T02:30:10.776656Z"}]}