CVE-2025-22470

SATO · SATO CL4NX Plus / CL6NX Plus / CL4NX-J Plus Series Printers

A critical vulnerability has been identified in specific SATO printer models, allowing a remote attacker to upload a malicious file and execute arbitrary code.

Executive summary

A critical vulnerability has been identified in specific SATO printer models, allowing a remote attacker to upload a malicious file and execute arbitrary code. Successful exploitation could lead to a complete compromise of the affected printer, potentially enabling attackers to steal sensitive data, disrupt business operations, or use the device as a pivot point to attack the broader internal network. Due to the critical severity, immediate remediation is strongly advised.

Vulnerability

The vulnerability exists within the file upload functionality of the affected SATO printers. An unauthenticated remote attacker can craft a dangerous file, such as one containing an embedded Lua script, and upload it to the device. The system fails to properly validate the uploaded file, leading to the execution of the embedded script with system-level privileges, resulting in a full device compromise.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could have significant business consequences. An attacker gaining full control of a printer could intercept and exfiltrate sensitive data processed by the device, such as shipping labels containing personally identifiable information (PII), confidential reports, or financial documents. The compromised printer could also be used as a launchpad for further attacks against the internal corporate network, bypassing perimeter security controls. Furthermore, an attacker could render the printer inoperable, causing a denial of service that disrupts critical business functions dependent on printing, such as logistics, manufacturing, and retail operations.

Remediation

Immediate Action: Immediately update the firmware on all affected SATO CL4/6NX Plus and CL4/6NX-J Plus printers to version 1.15.5-r1 or later. After patching, review system and access logs for any signs of compromise that may have occurred prior to the update, such as unusual file uploads or connections from untrusted IP addresses.

Proactive Monitoring: Implement enhanced monitoring for network traffic to and from the affected printers. Specifically, look for:

  • Unusual or unauthorized attempts to upload files to the devices.
  • Network connections originating from the printers to internal or external destinations.
  • Anomalous activity in printer logs, including errors or commands related to script execution.
  • Use network intrusion detection systems (NIDS) to alert on signatures associated with this exploit.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:

  • Network Segmentation: Isolate printers on a dedicated VLAN with strict firewall rules, allowing communication only with essential systems like print servers.
  • Access Control Lists (ACLs): Restrict access to the printer's management interface (web, FTP, etc.) to a limited set of authorized administrative workstations.
  • Disable Unused Services: Disable any unnecessary services or protocols on the printers to reduce the attack surface.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.8, this vulnerability poses a severe risk to the organization. The primary recommendation is to apply the vendor-supplied firmware update to all affected devices with extreme urgency. While there is no current evidence of active exploitation, critical vulnerabilities are prime targets for weaponization. If patching cannot be performed immediately, the compensating controls outlined above, particularly network segmentation and access restriction, must be implemented as a top priority to mitigate the immediate threat.