CVE-2025-9904

Sept. 29, 2025, 7:34 p.m.

6.9
Medium

Description

Unallocated memory access vulnerability in print processing of Generic Plus PCL6 Printer Driver / Generic Plus UFR II Printer Driver / Generic Plus LIPS4 Printer Driver / Generic Plus LIPSLX Printer Driver / Generic Plus PS Printer Driver

Product(s) Impacted

Vendor Product Versions
Generic
  • Plus Pcl6 Printer Driver
  • Plus Ufr Ii Printer Driver
  • Plus Lips4 Printer Driver
  • Plus Lipslx Printer Driver
  • Plus Ps Printer Driver
  • *
  • *
  • *
  • *
  • *

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-696
Incorrect Behavior Order
The product performs multiple related behaviors, but the behaviors are performed in the wrong order in ways which may produce resultant weaknesses.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a generic plus_pcl6_printer_driver / / / / / / / /
a generic plus_ufr_ii_printer_driver / / / / / / / /
a generic plus_lips4_printer_driver / / / / / / / /
a generic plus_lipslx_printer_driver / / / / / / / /
a generic plus_ps_printer_driver / / / / / / / /

CVSS Score

6.9 / 10

CVSS Data - 4.0

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Attack Requirements: NONE
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope:
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploit Maturity: NOT_DEFINED
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    View Vector String

Timeline

Published: Sept. 29, 2025, 1:15 a.m.
Last Modified: Sept. 29, 2025, 7:34 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

f98c90f0-e9bd-4fa7-911b-51993f3571fd

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.