sábado, 22 de agosto de 2020

New Printers Vulnerable To Old Languages

When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.

35 year old bugs features

The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
  • Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
  • Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
  • List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
  • Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
  • Launch denial of Service attacks of various kinds:

Now exploitable from the web

All attacks can be carried out by anyone who can print, which includes:
Note that the product was tested in the default configuration. To be fair, one has to say that the HP PageWide Color Flow MFP 586 allows strong, Kerberos based user authentication. The permission to print, and therefore to attack the device, can be be limited to certain employees, if configured correctly. The attacks can be easily reproduced using our PRET software. We informed HP's Software Security Response Team (SSRT) in February.

Conclusion: Christian Slater is right

PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…

Continue reading


  1. Hacker Tools For Pc
  2. Nsa Hack Tools
  3. Pentest Tools For Windows
  4. Hackrf Tools
  5. What Are Hacking Tools
  6. Hacker Tools Mac
  7. Pentest Tools Framework
  8. Pentest Tools For Windows
  9. Tools 4 Hack
  10. Pentest Tools Apk
  11. Game Hacking
  12. How To Make Hacking Tools
  13. Hack Tools Pc
  14. Hackrf Tools
  15. Hacker Tools
  16. Hacker Tools For Pc
  17. How To Install Pentest Tools In Ubuntu
  18. Usb Pentest Tools
  19. Android Hack Tools Github
  20. Hacking Tools And Software
  21. Hack Tools
  22. Hak5 Tools
  23. Pentest Box Tools Download
  24. Usb Pentest Tools
  25. Pentest Tools Nmap
  26. Hacking Tools For Beginners
  27. New Hacker Tools
  28. Hacker Tools Linux
  29. Hacker Tools 2020
  30. Top Pentest Tools
  31. Hacking Tools And Software
  32. Hack Tools For Windows
  33. Hack App
  34. Pentest Automation Tools
  35. Best Hacking Tools 2019
  36. Growth Hacker Tools
  37. Hacker Tools Online
  38. Pentest Tools For Windows
  39. Hack App
  40. Hack Tools Download
  41. Android Hack Tools Github
  42. Hacking Tools Kit
  43. Hack Tools For Games
  44. Pentest Tools List
  45. Hack Tools Download
  46. How To Hack
  47. Pentest Automation Tools
  48. Pentest Tools For Windows
  49. Pentest Tools Download
  50. Pentest Tools Nmap
  51. Android Hack Tools Github
  52. Hack Tool Apk
  53. What Are Hacking Tools
  54. Hacking App
  55. Pentest Tools Port Scanner
  56. Hacks And Tools
  57. Hacking Tools Software
  58. Tools Used For Hacking
  59. Hack Tools For Windows
  60. Hacking Tools For Games
  61. Hacker
  62. Hacker
  63. Hacking Tools For Windows
  64. Pentest Tools List
  65. Pentest Tools Free
  66. Hacker Tools 2020
  67. Hacker Tools For Ios
  68. Hacking Tools Online
  69. Pentest Tools
  70. Hacker Tool Kit
  71. Hak5 Tools
  72. Hack Tools Pc
  73. Github Hacking Tools
  74. Pentest Automation Tools
  75. Hacking Tools For Windows
  76. Pentest Tools Windows
  77. Termux Hacking Tools 2019
  78. Github Hacking Tools
  79. Hacker Tools 2019
  80. Hacker Hardware Tools
  81. Hack Tools Github
  82. Hacker Tools Free
  83. Nsa Hack Tools
  84. Pentest Tools
  85. Hackers Toolbox
  86. Hack Apps
  87. Hacker Tools Linux
  88. How To Hack
  89. Hacker Tools For Mac
  90. Hacking Tools Usb
  91. Hacking Tools Pc
  92. Termux Hacking Tools 2019
  93. Hacker Tools Free Download
  94. Pentest Tools For Windows
  95. Pentest Tools Bluekeep
  96. Pentest Box Tools Download
  97. Hacking Tools For Windows
  98. Pentest Tools Website
  99. Pentest Tools Find Subdomains
  100. Hackers Toolbox
  101. Pentest Tools Download
  102. Pentest Reporting Tools
  103. Kik Hack Tools
  104. Bluetooth Hacking Tools Kali
  105. Hacking Tools Hardware
  106. Hack Tools For Ubuntu
  107. Hacking Tools Windows
  108. Hacking Tools Download
  109. Hack Tools 2019
  110. Hacking Tools Pc
  111. Hacker Tools Mac
  112. Github Hacking Tools
  113. Nsa Hack Tools Download
  114. Pentest Tools Website
  115. Hacker Tools Hardware
  116. Pentest Tools Bluekeep
  117. Pentest Tools Free
  118. Game Hacking
  119. Hacker Tools Linux
  120. Nsa Hack Tools Download
  121. Hacking Tools
  122. Hacker Tools Free Download
  123. Hacking Tools For Windows 7
  124. Hacker Tools List
  125. Github Hacking Tools
  126. Computer Hacker
  127. Beginner Hacker Tools
  128. Hacking Tools Pc
  129. Pentest Tools For Android
  130. Pentest Tools Apk
  131. Pentest Reporting Tools
  132. Pentest Automation Tools
  133. Hacking Tools For Mac
  134. Pentest Recon Tools
  135. Hack Tool Apk
  136. Pentest Box Tools Download
  137. Black Hat Hacker Tools
  138. Game Hacking
  139. Hacker Tools For Windows
  140. Pentest Tools Review
  141. Hack App
  142. Best Hacking Tools 2019
  143. Nsa Hack Tools Download
  144. Hacking Tools 2020
  145. Hack Tools
  146. Pentest Tools Free
  147. Kik Hack Tools
  148. Pentest Tools Download
  149. Pentest Tools For Windows
  150. Physical Pentest Tools
  151. Hack Tools For Windows
  152. Hack Tools
  153. Hacking Tools Mac
  154. Pentest Tools Apk
  155. Hacker Tools List
  156. Hacker Tools For Windows
  157. Pentest Automation Tools
  158. Pentest Tools For Android
  159. Hacker Tools For Windows
  160. Nsa Hack Tools
  161. Hacker Tool Kit
  162. Hacker Tools Linux
  163. Pentest Tools Kali Linux
  164. Hack Tools For Pc
  165. Hack Tools
  166. Pentest Tools Windows
  167. Ethical Hacker Tools

Nenhum comentário: