• DoS Vulnerability in the Web Connection of Konica Minolta Multifunction Printers

    Warning alert system concept, system hacked on computer network, cybercrime and virus, Malicious software, compromised information, illegal connection, data breach cybersecurity vulnerability.warning, hacker, alert, crime, system, security, spyware, attack, network, access, cyber, data, information, internet, message, password, concept, cyber security, protection, server, software, virus, computer, danger, technology, digital, connection, cyberspace, leak, online, safety, website, fraud, malicious, vulnerability, web, antivirus, breach, detection, malware, intrusion, corporate, firewall, privacy, problem, typing, laptop, notebook, notice, red, warning, hacker, alert, crime, system, security, spyware, attack, network, access, cyber, data, information, internet, message, password, concept, cyber security, protection, server, software, virus, computer, danger, technology, digital, connection, cyberspace, leak, online, safety, website, fraud, malicious, vulnerability, web, antivirus, breach, detection, malware, intrusion, corporate, firewall, privacy, problem, typing, laptop, notebook, notice
Warning alert system concept, system hacked on computer network, cybercrime and virus, Malicious software, compromised information, illegal connection, data breach cybersecurity vulnerability
Corporate/Company,  warning,  hacker,  alert,  crime,  system,  security,  spyware,  attack,  network,  access,  cyber,  data,  information,  internet,  message,  password,  concept,  protection,  server,  software,  virus,  computer,  danger,  technology,  digital,  connection,  cyberspace,  leak,  online,  safety,  website,  fraud,  malicious,  vulnerability,  web,  antivirus,  breach,  detection,  malware,  intrusion,  corporate,  firewall,  privacy,  problem,  typing,  laptop,  notebook,  notice,  red,  cyber security,  log4j

DoS Vulnerability in the Web Connection of Konica Minolta Multifunction Printers

Dear Customers,

We deeply appreciate your constant patronage to Konica Minolta products.

A vulnerability that allows a Denial-of-Service (DoS) attack has been newly identified in the indicated models. This advisory provides an overview of the issue and the recommended countermeasures.

Please note that, at the time of publication (August 29th, 2025), there have been no confirmed security incidents globally resulting from the exploitation of this vulnerability.

Overview of the vulnerabilities

Ref. ID

CVSSv3.1

Base Score

Vulnerabilities description

CVE-2025-54777

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

4.3

Importing a malformed file in [Registration of Certification Information] for S/MIME for Email Destination causes the Web Connection to stop.

Affected Models and the countermeasure firmware

Product name

Affected version

Fixed Version

Latest Version

(as of August 2025)

bizhub C751i

bizhub C651i/C551i/C451i

bizhub C361i/C301i/C251i

bizhub C4051i/C3351i/C4001i/C3301i

bizhub C3321i

bizhub 751i

bizhub 651i/551i/451i

bizhub 361i/301i

bizhub 4751i/4051i

bizhub 4701i

bizhub C750i

bizhub C650i/C550i/C450i

bizhub C360i/C300i/C250i

bizhub C287i/C257i/C227i

bizhub C4050i/C3350i/C4000i/C3300i

bizhub C3320i

bizhub 950i/850i

bizhub 750i

bizhub 650i/550i/450i

bizhub 360i/300i

bizhub 306i/266i/246i/226i

bizhub 4750i/4050i

bizhub 4700i

G00-RE or earlier

GC2-RE or later

(Except G00-RF)

G00-S7

bizhub C759/C659

bizhub C658/C558/C458

bizhub 958/808/758

bizhub 658e/558e/458e

bizhub C287/C227

GCQ-Y2 or earlier

GCR-Y2 or later

G00-YE

bizhub C368/C308/C258

bizhub 558/458/368/308

bizhub C3851/C3851FS/C3351

bizhub 4752/4052

GCQ-X4 or earlier

GCR-X4 or later

G00-YE

bizhub 368e/308e

GCQ-X8 or earlier

GCR-X8 or later

G00-YE

bizhub 367/287/227

GCQ-Y3 or earlier

GCR-Y3 or later

G00-YE

Impact on Multifunction Printers

Web Connection becomes completely unresponsive. (Other MFP functions are not affected.)

Remediation

The countermeasure firmware will be applied sequentially, either remotely or during the next visit by your authorized Konica Minolta service representative.

Vulnerability Specific Recommendation

1. Ensure that the administrator password is secure. If it remains set to its factory default, please change it immediately to a strong complex password.

Configuration: [Utility] - [Administrator] - [Security] - [Administrator Password Setting]

2. Restrict non-Admin users from making any address book destination changes.

Configuration: [Utility] - [Administrator] - [Security] - [Restrict User Access] - [Registering and Changing Addresses]: [Restrict]

General Security Recommendations

To ensure a secure operating posture for your multifunction devices, and to reduce exposure to the vulnerability described in this advisory, Konica Minolta strongly recommends applying the following configuration best practices:

For comprehensive information on secure configuration, please refer to our Product Security web site.

Enhancing the Security of Products and Services

Konica Minolta considers the security of its products and services to be an important responsibility and will continue to actively respond to incidents and vulnerabilities.

Related Information

JVNVU#99831542

Acknowledgements

We would like to express our sincere appreciation to the penetration testers Miguel Alves (0xmupa) for discovering and responsibly reporting this vulnerability

Contact

Should you require further clarification or assistance with implementing the recommended measures or applying the relevant firmware update, please contact your authorized Konica Minolta service representative.