Critical Canon MailSuite Vulnerability Enables Remote Code Execution Attacks


Canon Marketing Japan has disclosed a critical vulnerability in GUARDIANWALL MailSuite that can let remote attackers execute arbitrary code on affected systems.

The flaw, tracked as CVE-2026-32661 and JVN#35567473, affects GUARDIANWALL MailSuite on-premises versions 1.4.00 through 2.4.26. JPCERT/CC says attacks exploiting the vulnerability have already been observed against on-premises deployments.

The issue affects the product’s web service when the system runs the pop3wallpasswd command with grdnwww user privileges. Administrators should apply Canon’s patch immediately or restrict the management interface until they can complete remediation.

What is the Canon MailSuite vulnerability?

The vulnerability comes from a stack-based buffer overflow in the pop3wallpasswd command inside GUARDIANWALL MailSuite. A buffer overflow happens when software writes more data to memory than the allocated space can safely hold.

An attacker can send a specially crafted request to the affected product’s web service. If the system uses the vulnerable configuration, the request can trigger memory corruption and allow arbitrary code execution.

JVN rates the flaw as critical with a CVSS v3.0 score of 9.8. The advisory also lists a CVSS v4.0 score of 9.3, which still places the issue in the critical range.

ItemDetails
Vulnerability IDCVE-2026-32661, JVN#35567473
ProductGUARDIANWALL MailSuite
VendorCanon Marketing Japan Inc.
Vulnerability typeStack-based buffer overflow
Affected commandpop3wallpasswd
ImpactRemote arbitrary code execution
SeverityCritical

Affected Canon GUARDIANWALL versions

The affected on-premises versions include GUARDIANWALL MailSuite Ver. 1.4.00 through Ver. 2.4.26. Canon says versions earlier than 1.4.00 do not face this specific issue.

Legacy GUARDIANWALL versions 7.x and 8.x also do not fall under this advisory. However, administrators should still check their support status and review other product-specific security guidance.

GUARDIANWALL Mail Security Cloud, the SaaS version, also had exposure before Canon’s April 30, 2026 maintenance. Canon says that cloud service received remediation during that maintenance window.

Product or versionStatus
GUARDIANWALL MailSuite Ver. 1.4.00 to Ver. 2.4.26Affected
GUARDIANWALL MailSuite earlier than Ver. 1.4.00Not affected by this flaw
Legacy GUARDIANWALL Ver. 7.x and 8.xNot affected by this flaw
GUARDIANWALL Mail Security Cloud before April 30, 2026 maintenancePreviously affected
GUARDIANWALL Mail Security Cloud after April 30, 2026 maintenanceFixed

Why CVE-2026-32661 is dangerous

Email security gateways sit close to sensitive corporate communication. A remote code execution flaw in this layer can create serious risk for organizations that expose administrative services or run vulnerable configurations.

JPCERT/CC says attackers can exploit the vulnerability without authentication by sending a crafted request to the product’s web service. That makes patching urgent for any exposed deployment.

The risk becomes higher because exploitation has already been observed in the wild against GUARDIANWALL MailSuite on-premises systems. Security teams should treat affected environments as high-priority assets and investigate for possible compromise.

How attackers can exploit the flaw

The vulnerable condition exists when the product can run pop3wallpasswd with grdnwww user privileges. In that setup, a malicious request to the web service can trigger the buffer overflow.

Successful exploitation can let attackers execute code in the affected service context. From there, attackers may attempt further movement, data access, or persistence depending on the server’s exposure and internal controls.

Canon says attackers cannot exploit the flaw remotely if the affected product’s management interface does not face external networks. The company also says IP-based access restrictions can reduce risk when immediate patching cannot happen.

  • Review whether GUARDIANWALL MailSuite runs an affected version.
  • Check whether the management interface faces external networks.
  • Restrict access to trusted IP addresses where possible.
  • Preserve logs for investigation if the service had exposure.
  • Apply Canon’s remediation patch as soon as possible.

Patch and mitigation steps for administrators

Canon has provided remediation patches and instructions to contracted users through support channels. Administrators should follow the vendor’s instructions and complete patch deployment before restoring normal management access.

If teams cannot apply the patch immediately, Canon recommends stopping the GUARDIANWALL MailSuite management screen on the WGW worker server. This workaround can reduce exposure, but it can also disrupt administrative operations.

Canon lists the following command to stop the management process on the WGW worker server:

/etc/init.d/grdn-wgw-work stop

After administrators apply the official patch and complete checks, they can restart the management process with this command:

/etc/init.d/grdn-wgw-work start

Organizations using affected GUARDIANWALL MailSuite versions should not treat this as a routine update. The public advisory confirms active exploitation, so administrators should combine patching with investigation.

Teams should first identify all affected servers, confirm exposure, and collect relevant logs before making changes that could erase useful evidence. They should then patch, restrict management access, and review authentication and network logs for suspicious activity.

Security teams should also contact Canon’s product support desk if they need help confirming whether their environment has the vulnerable configuration.

  1. Identify all GUARDIANWALL MailSuite deployments.
  2. Check version numbers and confirm whether they fall between 1.4.00 and 2.4.26.
  3. Determine whether the management interface has external exposure.
  4. Apply Canon’s remediation patch from official support channels.
  5. Use the temporary workaround if patching cannot happen immediately.
  6. Restrict management access by IP address wherever possible.
  7. Preserve and review web service, system, and access logs.
  8. Look for signs of unauthorized code execution or abnormal process activity.
  9. Contact Canon support to confirm impact and patch status.

FAQ

What is CVE-2026-32661 in Canon GUARDIANWALL MailSuite?

CVE-2026-32661 is a critical stack-based buffer overflow vulnerability in GUARDIANWALL MailSuite. It can allow remote attackers to execute arbitrary code through a specially crafted request to the product’s web service.

Which GUARDIANWALL MailSuite versions are affected?

GUARDIANWALL MailSuite Ver. 1.4.00 through Ver. 2.4.26 are affected. Versions earlier than 1.4.00 and legacy GUARDIANWALL Ver. 7.x and 8.x are not affected by this specific flaw.

Has Canon fixed the GUARDIANWALL Mail Security Cloud version?

Yes. Canon says GUARDIANWALL Mail Security Cloud, the SaaS version, received remediation during maintenance performed on April 30, 2026.

What should administrators do about the Canon MailSuite vulnerability?

Administrators should apply Canon’s remediation patch, restrict access to the management interface, preserve logs, investigate for compromise, and use Canon’s temporary workaround if they cannot patch immediately.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages