When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…Continue reading
- Hack Tool Apk No Root
- Android Hack Tools Github
- Pentest Tools Review
- Hack Tool Apk No Root
- Hacker Tools For Pc
- Pentest Tools Alternative
- Hack Tools For Ubuntu
- Hacker Tools For Windows
- Pentest Tools Online
- Hacking Tools And Software
- Hacker Tools List
- Hacker Security Tools
- Pentest Tools Free
- Hacker Tools Apk Download
- Hacker Tools 2019
- What Are Hacking Tools
- Pentest Tools Alternative
- Github Hacking Tools
- How To Hack
- Blackhat Hacker Tools
- Pentest Automation Tools
- Pentest Tools Review
- Pentest Reporting Tools
- Hacks And Tools
- Hack Tools Pc
- Free Pentest Tools For Windows
- Pentest Tools Online
- Hack Tools 2019
- Pentest Tools Tcp Port Scanner
- Easy Hack Tools
- Android Hack Tools Github
- How To Hack
- Hacking Tools For Windows Free Download
- Hacking Tools For Kali Linux
- Best Pentesting Tools 2018
- Pentest Tools Apk
- Hack Tools For Pc
- Hack Apps
- Nsa Hack Tools Download
- Best Hacking Tools 2019
- Best Pentesting Tools 2018
- Game Hacking
- Pentest Tools For Windows
- Nsa Hack Tools
- Free Pentest Tools For Windows
- Underground Hacker Sites
- Hack Tools
- Hacking Tools 2019
- Pentest Tools Download
- Physical Pentest Tools
- Hack Tools Pc
- Hacker Tools Linux
- Hacking Tools Usb
- Hacking Tools For Mac
- Hacking Tools Usb
- Pentest Tools Free
- Hack Rom Tools
- What Is Hacking Tools
- Pentest Box Tools Download
- Hacker Tools List
- Pentest Tools List
- Hacker Tools Free
- Pentest Box Tools Download
- Pentest Tools Free
- Hack Apps
- Kik Hack Tools
- Pentest Tools For Ubuntu
- Hacking Tools Pc
- Best Pentesting Tools 2018
- Hacking Tools For Pc
- Hacking Tools Usb
- Tools 4 Hack
- Pentest Automation Tools
- Hacks And Tools
- Nsa Hacker Tools
- Hacking Tools 2020
- Hacker Tools For Pc
- Hack Tools Download
- Hack And Tools
- Hacker Tools Apk
- Hacking Tools Kit
- Hacking Tools For Mac
- Hacking Tools For Mac
- Hacking Tools For Windows
- Hack App
- Hacking Tools For Kali Linux
- Pentest Tools For Windows
- Hacks And Tools
- Pentest Tools Framework
- Pentest Tools Review
- Hack App
- Hack Tool Apk
- Hacking Tools For Windows 7
- Hack Tools Pc
- Pentest Tools Apk
- Pentest Tools Alternative
- Hacking Apps
- Hacking Tools For Windows 7
- Hacking Tools 2019
- Hack App
- Hak5 Tools
- Pentest Tools For Windows
- Hack Tool Apk No Root
- Hacking Tools Windows 10
- Pentest Tools Alternative
- Hack Tools For Ubuntu
- Kik Hack Tools
- Hack Tools Download
- Hackers Toolbox
- Hacking Tools 2019
- Hacker Search Tools
- Hacking Tools Name
- Hacking Tools 2019
- Github Hacking Tools
- Hacking App
- Hacker Tools 2019
- World No 1 Hacker Software
- Pentest Tools Nmap
- Hacker Tools Github
- Pentest Tools For Mac
- Hack Tool Apk
- Hacking Apps
- Hacker Techniques Tools And Incident Handling
- Tools 4 Hack
- Hack Tools Mac
- Hack Tools Mac
- Hacking Tools Kit
- What Are Hacking Tools
- Best Hacking Tools 2019
- Best Hacking Tools 2020
- How To Make Hacking Tools
Tidak ada komentar:
Posting Komentar