Critical Canon MailSuite Vulnerability Actively Exploited in the Wild
When Enterprise Mail Security Becomes the Attack Surface As an independent cybersecurity blogger and part time penetration tester, email security gateways are often deployed specifically to protect organizations from cyberattacks. That is exactly why the newly disclosed Canon GUARDIANWALL MailSuite vulnerability is so concerning. Researchers and Japanese security authorities confirmed that attackers are already exploiting a critical stack based buffer overflow vulnerability that allows unauthenticated remote code execution against vulnerable Canon mail security infrastructure. The flaw, tracked as CVE-2026-32661 , carries: CVSS v3 score: 9.8 Critical Network based exploitation No authentication required Arbitrary code execution potential Because MailSuite products frequently sit directly in front of enterprise email infrastructure, the implications are severe. What Happened: Canon Disclosed an Actively Exploited RCE Vulnerability Canon Marketing Japan and JPCERT/CC...