When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…Continue reading
- Hacker Tools For Pc
- Nsa Hack Tools
- Pentest Tools For Windows
- Hackrf Tools
- What Are Hacking Tools
- Hacker Tools Mac
- Pentest Tools Framework
- Pentest Tools For Windows
- Tools 4 Hack
- Pentest Tools Apk
- Game Hacking
- How To Make Hacking Tools
- Hack Tools Pc
- Hackrf Tools
- Hacker Tools
- Hacker Tools For Pc
- How To Install Pentest Tools In Ubuntu
- Usb Pentest Tools
- Android Hack Tools Github
- Hacking Tools And Software
- Hack Tools
- Hak5 Tools
- Pentest Box Tools Download
- Usb Pentest Tools
- Pentest Tools Nmap
- Hacking Tools For Beginners
- New Hacker Tools
- Hacker Tools Linux
- Hacker Tools 2020
- Top Pentest Tools
- Hacking Tools And Software
- Hack Tools For Windows
- Hack App
- Pentest Automation Tools
- Best Hacking Tools 2019
- Growth Hacker Tools
- Hacker Tools Online
- Pentest Tools For Windows
- Hack App
- Hack Tools Download
- Android Hack Tools Github
- Hacking Tools Kit
- Hack Tools For Games
- Pentest Tools List
- Hack Tools Download
- How To Hack
- Pentest Automation Tools
- Pentest Tools For Windows
- Pentest Tools Download
- Pentest Tools Nmap
- Android Hack Tools Github
- Hack Tool Apk
- What Are Hacking Tools
- Hacking App
- Pentest Tools Port Scanner
- Hacks And Tools
- Hacking Tools Software
- Tools Used For Hacking
- Hack Tools For Windows
- Hacking Tools For Games
- Hacker
- Hacker
- Hacking Tools For Windows
- Pentest Tools List
- Pentest Tools Free
- Hacker Tools 2020
- Hacker Tools For Ios
- Hacking Tools Online
- Pentest Tools
- Hacker Tool Kit
- Hak5 Tools
- Hack Tools Pc
- Github Hacking Tools
- Pentest Automation Tools
- Hacking Tools For Windows
- Pentest Tools Windows
- Termux Hacking Tools 2019
- Github Hacking Tools
- Hacker Tools 2019
- Hacker Hardware Tools
- Hack Tools Github
- Hacker Tools Free
- Nsa Hack Tools
- Pentest Tools
- Hackers Toolbox
- Hack Apps
- Hacker Tools Linux
- How To Hack
- Hacker Tools For Mac
- Hacking Tools Usb
- Hacking Tools Pc
- Termux Hacking Tools 2019
- Hacker Tools Free Download
- Pentest Tools For Windows
- Pentest Tools Bluekeep
- Pentest Box Tools Download
- Hacking Tools For Windows
- Pentest Tools Website
- Pentest Tools Find Subdomains
- Hackers Toolbox
- Pentest Tools Download
- Pentest Reporting Tools
- Kik Hack Tools
- Bluetooth Hacking Tools Kali
- Hacking Tools Hardware
- Hack Tools For Ubuntu
- Hacking Tools Windows
- Hacking Tools Download
- Hack Tools 2019
- Hacking Tools Pc
- Hacker Tools Mac
- Github Hacking Tools
- Nsa Hack Tools Download
- Pentest Tools Website
- Hacker Tools Hardware
- Pentest Tools Bluekeep
- Pentest Tools Free
- Game Hacking
- Hacker Tools Linux
- Nsa Hack Tools Download
- Hacking Tools
- Hacker Tools Free Download
- Hacking Tools For Windows 7
- Hacker Tools List
- Github Hacking Tools
- Computer Hacker
- Beginner Hacker Tools
- Hacking Tools Pc
- Pentest Tools For Android
- Pentest Tools Apk
- Pentest Reporting Tools
- Pentest Automation Tools
- Hacking Tools For Mac
- Pentest Recon Tools
- Hack Tool Apk
- Pentest Box Tools Download
- Black Hat Hacker Tools
- Game Hacking
- Hacker Tools For Windows
- Pentest Tools Review
- Hack App
- Best Hacking Tools 2019
- Nsa Hack Tools Download
- Hacking Tools 2020
- Hack Tools
- Pentest Tools Free
- Kik Hack Tools
- Pentest Tools Download
- Pentest Tools For Windows
- Physical Pentest Tools
- Hack Tools For Windows
- Hack Tools
- Hacking Tools Mac
- Pentest Tools Apk
- Hacker Tools List
- Hacker Tools For Windows
- Pentest Automation Tools
- Pentest Tools For Android
- Hacker Tools For Windows
- Nsa Hack Tools
- Hacker Tool Kit
- Hacker Tools Linux
- Pentest Tools Kali Linux
- Hack Tools For Pc
- Hack Tools
- Pentest Tools Windows
- Ethical Hacker Tools
Nenhum comentário:
Postar um comentário