When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…Related news
- Pentest Tools Bluekeep
- Hacker Security Tools
- Pentest Tools For Android
- Hacking Tools Usb
- Hacker Tools For Ios
- Nsa Hack Tools Download
- Hacker
- Hack And Tools
- Hacker Security Tools
- Hackrf Tools
- Hacker Tools Hardware
- Physical Pentest Tools
- Hack Tools Github
- Hack Tools For Games
- Ethical Hacker Tools
- Pentest Tools List
- Hacking Tools For Kali Linux
- Hacker Tools Software
- New Hacker Tools
- Hacking Tools Online
- New Hacker Tools
- Hacker Tools For Windows
- Pentest Tools Review
- Pentest Tools
- What Is Hacking Tools
- Pentest Tools Subdomain
- Hacker Tools Mac
- Hacking Tools Kit
- Pentest Tools List
- Physical Pentest Tools
- Hack Tools For Windows
- Hak5 Tools
- Pentest Tools For Android
- Hacking Apps
- Pentest Reporting Tools
- Hack Rom Tools
- Tools For Hacker
- Hack Apps
- Free Pentest Tools For Windows
- Hackrf Tools
- Hacking Tools For Mac
- Hacking Tools Usb
- Install Pentest Tools Ubuntu
- Hacking Tools
- Hacker Tools Hardware
- Hack Tools 2019
- Hack Tools
- Hack Tools For Games
- Hacking Tools And Software
- Free Pentest Tools For Windows
- Computer Hacker
- Hack Tools For Games
- Hacking Tools Download
- Hacker
- Hacking Apps
- Game Hacking
- New Hack Tools
- How To Install Pentest Tools In Ubuntu
- Hack Tools For Games
- Pentest Tools Find Subdomains
- Hack Rom Tools
- Hack Website Online Tool
- Hack Tools Github
- Install Pentest Tools Ubuntu
- Computer Hacker
- Hack Tools
- Pentest Tools Subdomain
- Pentest Tools Tcp Port Scanner
- Hackrf Tools
- Hack Tools
- Kik Hack Tools
- Hacking Tools Online
- Pentest Tools Free
- Hacking Tools For Mac
- Hacking Tools For Mac
- Easy Hack Tools
- Pentest Tools For Mac
- Hacker Tools Mac
- Hacking Tools Pc
- Hack Tools For Windows
- Beginner Hacker Tools
- Hack Tools Online
- Hacking Tools Usb
- Pentest Tools Port Scanner
- Hack Tool Apk
- Hack Tools For Pc
- Pentest Tools Find Subdomains
- Tools 4 Hack
- Pentest Tools Free
- New Hacker Tools
- Pentest Tools Website Vulnerability
- Best Hacking Tools 2019
- Hacker Techniques Tools And Incident Handling
- How To Make Hacking Tools
- Wifi Hacker Tools For Windows
- Bluetooth Hacking Tools Kali
- Hacking Tools Windows 10
- Hacker Tools List
- Hack Tools 2019
- Hacker Tools Hardware
- Hack Tools Online
- Android Hack Tools Github
- Hackrf Tools
- Hacker Tool Kit
- Hacker Tools Windows
- Pentest Automation Tools
- What Are Hacking Tools
- Kik Hack Tools
- New Hack Tools
- Wifi Hacker Tools For Windows
- Hacker Tools Apk Download
- What Is Hacking Tools
- New Hacker Tools
- Ethical Hacker Tools
- Pentest Tools Download
- Hacks And Tools
- Hackers Toolbox
- Best Pentesting Tools 2018
- Hacking Tools Kit
- Hack App
- Hack Tools Pc
- Hackrf Tools
- Hacking Tools Mac
- Pentest Tools Find Subdomains
- Hacker Hardware Tools
- Pentest Tools Windows
- Ethical Hacker Tools
- Hacker Tools Windows
- Hacking Tools Kit
- Termux Hacking Tools 2019
- Easy Hack Tools
- Best Hacking Tools 2019
- Pentest Tools List
- Pentest Tools Github
- Pentest Tools Free
- Hacking Tools For Mac
- Hacker Security Tools
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Nmap
- Best Hacking Tools 2020
- Hack Tool Apk
- Hacker Tools 2020
- Hacking Tools Mac
- Hack Tools
- Physical Pentest Tools
- Pentest Tools Find Subdomains
- Pentest Tools For Windows
- Hack Tools Pc
- Pentest Tools Website
- Hackers Toolbox
- Hacking Tools Windows
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Games
- Tools Used For Hacking
- Pentest Tools Port Scanner
- Beginner Hacker Tools
- Hacking Tools Windows
- Pentest Tools Port Scanner
- Pentest Tools For Windows
- Hacker Tools Online
- Hacker Search Tools
- Hacking Tools Software
- Hacker Tools For Ios
- Hacker
- Hacker Tools 2020
- Hacking Tools And Software
- Hacker Tools For Windows
- Kik Hack Tools
- Hacking Tools Online
- Hacking Tools 2019
No comments:
Post a Comment