When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
More info35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…- Hacker Tools For Ios
- New Hack Tools
- Hack Tools For Mac
- Hacker Tools
- Pentest Recon Tools
- Pentest Tools For Android
- Ethical Hacker Tools
- Hacking Apps
- Hacker Tools Github
- Hacking Tools Windows
- Pentest Tools Open Source
- Pentest Tools Windows
- Hacker Tools Apk Download
- Hacker Tools For Pc
- Pentest Tools Apk
- Hacker Security Tools
- Hacking Tools For Games
- Hackrf Tools
- Pentest Automation Tools
- Pentest Tools For Mac
- Usb Pentest Tools
- Hacking Tools For Beginners
- Hack Tools For Pc
- Hack Tool Apk No Root
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Port Scanner
- Nsa Hacker Tools
- Hacking Tools For Mac
- Pentest Tools Linux
- Pentest Tools For Windows
- Hacking Tools Github
- Hack Tools Pc
- Hack Tools
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Android
- Black Hat Hacker Tools
- Pentest Tools Subdomain
- Hacking Tools For Mac
- Tools Used For Hacking
- Hackrf Tools
- Hack Tools
- Hacker Tools Free Download
- Top Pentest Tools
- Best Hacking Tools 2019
- Hak5 Tools
- Hack Tools
- Kik Hack Tools
- Hack Rom Tools
- Hack Tools Pc
- Pentest Box Tools Download
- Hacker Tools Online
- Hack And Tools
- Pentest Tools Free
- Hack Tools For Games
- Pentest Tools Url Fuzzer
- Pentest Tools Github
- New Hacker Tools
- Hacking Tools For Beginners
- Termux Hacking Tools 2019
- Best Pentesting Tools 2018
- Pentest Tools For Android
- Hack Tool Apk No Root
- Pentest Tools Apk
- Hacker Hardware Tools
- Hacking Tools 2020
- Hacking Tools Hardware
- Growth Hacker Tools
- Nsa Hack Tools Download
- Hacking Tools Download
- Hacker Tools List
- Hacking Tools Free Download
- Computer Hacker
- Hacking Apps
- Hack Tools
- Hacker Tools Software
- Android Hack Tools Github
- Hacking Apps
- Pentest Automation Tools
- Hacking Tools Pc
- Bluetooth Hacking Tools Kali
- World No 1 Hacker Software
- What Is Hacking Tools
- Pentest Tools Url Fuzzer
- Hack Website Online Tool
- Github Hacking Tools
- Pentest Tools Alternative
- Pentest Tools Windows
- Android Hack Tools Github
- Hack Tools Mac
- Hacking Tools Download
- Hacker Hardware Tools
- Hacker Tools Mac
- Hack Tools For Windows
- Pentest Tools Url Fuzzer
- Usb Pentest Tools
- Hacking Tools For Windows Free Download
- Pentest Tools Online
- Pentest Tools Apk
- Hacker Tools Apk Download
- Growth Hacker Tools
- Nsa Hack Tools Download
- Nsa Hack Tools Download
- Underground Hacker Sites
- Hack Tools Mac
- Pentest Tools Review
- Pentest Tools
- What Is Hacking Tools
- Pentest Tools Url Fuzzer
- Pentest Tools Online
- Hacks And Tools
- Pentest Box Tools Download
- Hackers Toolbox
- Hack Tools
- Hack Tools For Ubuntu
- Hack Tools Pc
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Beginners
- Hacking Tools For Beginners
- Pentest Tools For Ubuntu
- Hacker Tools Apk
- World No 1 Hacker Software
- Pentest Tools For Mac
- Pentest Tools Online
- Hack Apps
- Underground Hacker Sites
- Pentest Tools For Android
- Pentest Tools Website Vulnerability
- Hack Tools For Pc
- Bluetooth Hacking Tools Kali
No comments:
Post a Comment