Sunday, August 30, 2020

New Printers Vulnerable To Old Languages

When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.

35 year old bugs features

The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
  • Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
  • Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
  • List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
  • Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
  • Launch denial of Service attacks of various kinds:

Now exploitable from the web

All attacks can be carried out by anyone who can print, which includes:
Note that the product was tested in the default configuration. To be fair, one has to say that the HP PageWide Color Flow MFP 586 allows strong, Kerberos based user authentication. The permission to print, and therefore to attack the device, can be be limited to certain employees, if configured correctly. The attacks can be easily reproduced using our PRET software. We informed HP's Software Security Response Team (SSRT) in February.

Conclusion: Christian Slater is right

PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…

More info
  1. Hacker Tools For Ios
  2. New Hack Tools
  3. Hack Tools For Mac
  4. Hacker Tools
  5. Pentest Recon Tools
  6. Pentest Tools For Android
  7. Ethical Hacker Tools
  8. Hacking Apps
  9. Hacker Tools Github
  10. Hacking Tools Windows
  11. Pentest Tools Open Source
  12. Pentest Tools Windows
  13. Hacker Tools Apk Download
  14. Hacker Tools For Pc
  15. Pentest Tools Apk
  16. Hacker Security Tools
  17. Hacking Tools For Games
  18. Hackrf Tools
  19. Pentest Automation Tools
  20. Pentest Tools For Mac
  21. Usb Pentest Tools
  22. Hacking Tools For Beginners
  23. Hack Tools For Pc
  24. Hack Tool Apk No Root
  25. How To Install Pentest Tools In Ubuntu
  26. Pentest Tools Port Scanner
  27. Nsa Hacker Tools
  28. Hacking Tools For Mac
  29. Pentest Tools Linux
  30. Pentest Tools For Windows
  31. Hacking Tools Github
  32. Hack Tools Pc
  33. Hack Tools
  34. Hacker Techniques Tools And Incident Handling
  35. Pentest Tools Android
  36. Black Hat Hacker Tools
  37. Pentest Tools Subdomain
  38. Hacking Tools For Mac
  39. Tools Used For Hacking
  40. Hackrf Tools
  41. Hack Tools
  42. Hacker Tools Free Download
  43. Top Pentest Tools
  44. Best Hacking Tools 2019
  45. Hak5 Tools
  46. Hack Tools
  47. Kik Hack Tools
  48. Hack Rom Tools
  49. Hack Tools Pc
  50. Pentest Box Tools Download
  51. Hacker Tools Online
  52. Hack And Tools
  53. Pentest Tools Free
  54. Hack Tools For Games
  55. Pentest Tools Url Fuzzer
  56. Pentest Tools Github
  57. New Hacker Tools
  58. Hacking Tools For Beginners
  59. Termux Hacking Tools 2019
  60. Best Pentesting Tools 2018
  61. Pentest Tools For Android
  62. Hack Tool Apk No Root
  63. Pentest Tools Apk
  64. Hacker Hardware Tools
  65. Hacking Tools 2020
  66. Hacking Tools Hardware
  67. Growth Hacker Tools
  68. Nsa Hack Tools Download
  69. Hacking Tools Download
  70. Hacker Tools List
  71. Hacking Tools Free Download
  72. Computer Hacker
  73. Hacking Apps
  74. Hack Tools
  75. Hacker Tools Software
  76. Android Hack Tools Github
  77. Hacking Apps
  78. Pentest Automation Tools
  79. Hacking Tools Pc
  80. Bluetooth Hacking Tools Kali
  81. World No 1 Hacker Software
  82. What Is Hacking Tools
  83. Pentest Tools Url Fuzzer
  84. Hack Website Online Tool
  85. Github Hacking Tools
  86. Pentest Tools Alternative
  87. Pentest Tools Windows
  88. Android Hack Tools Github
  89. Hack Tools Mac
  90. Hacking Tools Download
  91. Hacker Hardware Tools
  92. Hacker Tools Mac
  93. Hack Tools For Windows
  94. Pentest Tools Url Fuzzer
  95. Usb Pentest Tools
  96. Hacking Tools For Windows Free Download
  97. Pentest Tools Online
  98. Pentest Tools Apk
  99. Hacker Tools Apk Download
  100. Growth Hacker Tools
  101. Nsa Hack Tools Download
  102. Nsa Hack Tools Download
  103. Underground Hacker Sites
  104. Hack Tools Mac
  105. Pentest Tools Review
  106. Pentest Tools
  107. What Is Hacking Tools
  108. Pentest Tools Url Fuzzer
  109. Pentest Tools Online
  110. Hacks And Tools
  111. Pentest Box Tools Download
  112. Hackers Toolbox
  113. Hack Tools
  114. Hack Tools For Ubuntu
  115. Hack Tools Pc
  116. Hacker Techniques Tools And Incident Handling
  117. Hacking Tools For Beginners
  118. Hacking Tools For Beginners
  119. Pentest Tools For Ubuntu
  120. Hacker Tools Apk
  121. World No 1 Hacker Software
  122. Pentest Tools For Mac
  123. Pentest Tools Online
  124. Hack Apps
  125. Underground Hacker Sites
  126. Pentest Tools For Android
  127. Pentest Tools Website Vulnerability
  128. Hack Tools For Pc
  129. Bluetooth Hacking Tools Kali

No comments: