When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…Read more
- Hacker Tools Online
- Hacking Tools For Beginners
- Hacker Tools For Pc
- Nsa Hack Tools
- Github Hacking Tools
- Underground Hacker Sites
- Pentest Tools Framework
- Hacking Tools For Games
- Hacker Tool Kit
- Hacker
- Hack Website Online Tool
- Computer Hacker
- Pentest Tools Url Fuzzer
- Hacking Tools Mac
- Hack Tools For Windows
- Tools 4 Hack
- Hacking Tools For Games
- Hacker Tools Linux
- Pentest Tools Url Fuzzer
- Hack Tools 2019
- Pentest Reporting Tools
- Kik Hack Tools
- Hacking Tools 2020
- New Hacker Tools
- Pentest Tools Url Fuzzer
- Hack Tools
- Pentest Tools Url Fuzzer
- Hacking Tools 2019
- Pentest Tools List
- Pentest Tools Download
- Hack Apps
- Hak5 Tools
- Pentest Tools Website
- Pentest Tools Open Source
- Hacker Tools Github
- Pentest Reporting Tools
- Hack Rom Tools
- Hacking App
- Hacking Tools For Windows 7
- Hack And Tools
- Hacker Tools Apk
- How To Install Pentest Tools In Ubuntu
- What Is Hacking Tools
- Pentest Tools Online
- Pentest Tools For Android
- Hacker Tools For Ios
- Hacking Tools For Beginners
- Hack Tools Download
- Tools 4 Hack
- Best Hacking Tools 2019
- Pentest Tools Online
- Hack Tools For Games
- Hack Tools Pc
- Pentest Tools Open Source
- Hacker Tools For Ios
- Nsa Hack Tools Download
- Hack Tools Download
- Hacking Apps
- Pentest Tools Windows
- Pentest Automation Tools
- Computer Hacker
- Pentest Recon Tools
- Hacking Tools Github
- Pentest Tools Find Subdomains
- Best Hacking Tools 2019
- Hacker Tools For Ios
- Hacking Tools 2020
- Hacking Tools For Pc
- Best Hacking Tools 2019
- Pentest Tools Apk
- Pentest Tools Online
- Pentest Tools Framework
- Pentest Tools For Ubuntu
- Pentest Tools Download
- Easy Hack Tools
- Bluetooth Hacking Tools Kali
- Hacking Tools Pc
- Hacking Tools Windows 10
- Hack Tools Github
- Hacker Tools Windows
- Pentest Box Tools Download
- Hack And Tools
- Pentest Tools Nmap
- Github Hacking Tools
- Pentest Tools Tcp Port Scanner
- Hackrf Tools
- Black Hat Hacker Tools
- Easy Hack Tools
- Computer Hacker
- Hacking App
- Hack Rom Tools
- New Hack Tools
- Hacking Tools For Windows
- What Are Hacking Tools
- Hack Tools For Games
- Physical Pentest Tools
- New Hacker Tools
- Pentest Tools Review
- Nsa Hack Tools
- Hack Apps
- Hack Tools For Windows
- Hacker Tools Apk
- Pentest Tools List
- Nsa Hacker Tools
- Hacker Tools Software
- Pentest Tools Website Vulnerability
- Pentest Tools Framework
- Pentest Tools For Android
- Hack Rom Tools
- Hacker Tools For Ios
- Hack Tool Apk
- Underground Hacker Sites
- Hack And Tools
- Pentest Tools Framework
- Hacking Apps
- Hacker Tools Apk
- What Are Hacking Tools
- Pentest Tools Android
- Underground Hacker Sites
- Hacking Tools Github
- World No 1 Hacker Software
- How To Install Pentest Tools In Ubuntu
- Hacker Tools 2020
- Hack Tools
- Pentest Tools Apk
- Hacker Tools For Pc
- Install Pentest Tools Ubuntu
- Pentest Automation Tools
- Hacking Tools For Mac
- Hacker Tools For Ios
- Hacker Tool Kit
- Pentest Tools Find Subdomains
- Hacking Tools For Windows 7
- Tools 4 Hack
- Hacker Tools Mac
- Pentest Automation Tools
- Android Hack Tools Github
- Beginner Hacker Tools
- Hacking Tools For Windows
- Hacking Tools Pc
- Pentest Tools Url Fuzzer
- Wifi Hacker Tools For Windows
- Pentest Reporting Tools
- Tools For Hacker
- Hacker Security Tools
- Underground Hacker Sites
- World No 1 Hacker Software
- Hacker Tools Hardware
- Pentest Tools Open Source
- Hack Tools For Mac
- What Is Hacking Tools
- Hack Tools For Games
- Hacker Tools For Windows
- Pentest Tools Nmap
- Hack Rom Tools
- Pentest Tools For Ubuntu
- Hacker Tools 2020
- Hack Tools For Mac
- Pentest Box Tools Download
- Hack Tools For Mac
- New Hacker Tools
- Wifi Hacker Tools For Windows
- Underground Hacker Sites
- Tools 4 Hack
- Pentest Tools Url Fuzzer
- Pentest Tools For Windows
- Hack And Tools
- Hacker Tools List
- Hacking Tools Hardware
Tidak ada komentar:
Posting Komentar