When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…More articles
- Hack Tools Download
- Hack App
- Hacker Tools Apk
- Pentest Tools Apk
- Pentest Tools For Windows
- Game Hacking
- Hack Tools Online
- Nsa Hacker Tools
- Hacking Tools For Windows Free Download
- Github Hacking Tools
- Pentest Automation Tools
- Hack Website Online Tool
- Hack Tools For Windows
- Pentest Tools Framework
- Best Hacking Tools 2019
- Hack Apps
- Pentest Tools For Android
- Blackhat Hacker Tools
- Pentest Tools Port Scanner
- What Is Hacking Tools
- Pentest Tools Find Subdomains
- Pentest Recon Tools
- Hacking Tools Hardware
- Hacker Tools Hardware
- Best Hacking Tools 2020
- Hack App
- Best Hacking Tools 2020
- Pentest Tools Bluekeep
- Pentest Tools Port Scanner
- Hacker Tools For Ios
- Beginner Hacker Tools
- Bluetooth Hacking Tools Kali
- Kik Hack Tools
- What Are Hacking Tools
- Pentest Tools For Android
- Pentest Tools For Ubuntu
- Pentest Tools Alternative
- Pentest Box Tools Download
- Pentest Tools Kali Linux
- Hack Tools Pc
- Hacking Tools
- Hack Tools Download
- Hack Tools Github
- Pentest Tools Apk
- Hacker Tools Apk
- Pentest Tools Nmap
- Hacking Tools For Windows
- Pentest Tools Nmap
- What Is Hacking Tools
- Hacker Tools
- World No 1 Hacker Software
- Pentest Tools Website
- Hacker Tools Hardware
- Tools Used For Hacking
- Pentest Tools Website
- Hacker Security Tools
- Hacking Tools Pc
- Blackhat Hacker Tools
- Bluetooth Hacking Tools Kali
- Hack Tools For Windows
- Hacking Apps
- Pentest Reporting Tools
- Pentest Tools For Windows
- Hacking Tools For Mac
- Hack Tools For Games
- Hacking Tools And Software
- Pentest Tools Website
- Pentest Recon Tools
- Pentest Tools Review
- Pentest Tools Subdomain
- Install Pentest Tools Ubuntu
- Hacker Tools List
- Hack And Tools
- New Hacker Tools
- Pentest Tools Open Source
- Pentest Tools Url Fuzzer
- How To Hack
- Black Hat Hacker Tools
- Growth Hacker Tools
- Tools For Hacker
- Pentest Recon Tools
- Computer Hacker
- Hack Tool Apk
- Pentest Tools Open Source
- Hack Tools Download
- Hacking Tools Download
- Hacking Tools For Pc
- Hack Tools 2019
- Hack Tools Github
- Hacking Tools For Windows Free Download
- Free Pentest Tools For Windows
- Black Hat Hacker Tools
- Hacking Tools 2019
- Easy Hack Tools
- Pentest Tools Open Source
- Hacker Tools Free Download
- Usb Pentest Tools
- Pentest Tools Framework
- Hacker Tools
- Install Pentest Tools Ubuntu
- Pentest Tools Windows
- Hacker Tools For Windows
- Hacker Tools Free
- Hack Tools For Windows
- Hacking Tools Windows
- Hack Rom Tools
- Hacker Tool Kit
- Pentest Tools Linux
- Hackrf Tools
- Hacking Tools Download
- Hacker Security Tools
- Hacker Tools
- Hacking Tools For Windows Free Download
- Hack Tools Pc
- How To Hack
- Pentest Tools List
- Nsa Hacker Tools
- Hack Tools Mac
- Growth Hacker Tools
- Hacker Tools Software
- New Hack Tools
- Hacks And Tools
- Pentest Tools Find Subdomains
- Blackhat Hacker Tools
- Hacking Tools Windows
- Hacker Tools Github
- Hacker Tools Free
- Hacking Tools For Windows Free Download
- Physical Pentest Tools
- Hacking Tools Download
- Blackhat Hacker Tools
- Free Pentest Tools For Windows
- Pentest Tools Kali Linux
- Pentest Tools Find Subdomains
- Pentest Tools For Ubuntu
- Hack Tools For Pc
- How To Hack
- How To Make Hacking Tools
- Pentest Tools For Windows
- What Is Hacking Tools
- Pentest Tools Framework
- Game Hacking
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Website
- Growth Hacker Tools
- Pentest Tools Online
- Pentest Tools Website
- Nsa Hack Tools Download
- What Are Hacking Tools
- Hacker Tools For Ios
- Hacker Tools Github
- Pentest Reporting Tools
- Computer Hacker
- Hacking Tools Github
- Hacker Tools Windows
- Hacking Tools For Pc
- Pentest Tools For Ubuntu
- Game Hacking
- Usb Pentest Tools
- Nsa Hack Tools Download
- Hack Tools For Mac
No comments:
Post a Comment