When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
Related links35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…- Android Hack Tools Github
- Pentest Tools Linux
- Hack Tool Apk No Root
- Hacker Tools Linux
- Hacker Tools Github
- Install Pentest Tools Ubuntu
- Tools For Hacker
- Pentest Tools Free
- Hack Tools For Games
- Hacking Tools For Windows Free Download
- Hacker Tools 2020
- Hack Tools For Mac
- How To Hack
- Hack Tools Mac
- Hack Tools
- Hacking App
- Pentest Tools
- New Hack Tools
- Tools For Hacker
- New Hacker Tools
- Hacking App
- Pentest Tools Website
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Online
- Best Pentesting Tools 2018
- Pentest Tools Kali Linux
- Hacking Tools For Mac
- Bluetooth Hacking Tools Kali
- Pentest Tools Website
- Hacking Tools For Mac
- Tools Used For Hacking
- Hacking App
- Hacker Tools Apk
- Pentest Tools Apk
- Pentest Tools Windows
- Pentest Tools Port Scanner
- Pentest Tools Alternative
- New Hack Tools
- How To Make Hacking Tools
- Install Pentest Tools Ubuntu
- Kik Hack Tools
- Hack Tool Apk No Root
- Pentest Tools For Mac
- Pentest Automation Tools
- Pentest Tools Bluekeep
- Hackers Toolbox
- How To Hack
- Hacking Apps
- Hacker Hardware Tools
- Hack Tools For Games
- Hacker Tools For Pc
- Pentest Recon Tools
- Hacker Tools For Pc
- Pentest Tools Kali Linux
- Hacker Tools Free
- Hacking Tools For Windows Free Download
- Pentest Tools For Android
- Hacking Tools Hardware
- Ethical Hacker Tools
- Underground Hacker Sites
- Hack Rom Tools
- Pentest Tools Open Source
- Usb Pentest Tools
- Tools Used For Hacking
- Pentest Tools Apk
- Hacking Tools For Pc
- Hacker Search Tools
- Hack Tools For Mac
- Pentest Tools Alternative
- Hacker Tools For Pc
- Hacking Tools Mac
- Black Hat Hacker Tools
- Hacking Tools Free Download
- Hacker Tools Apk
- Hacking Tools For Mac
- Hacker Tools Apk Download
- Hacking Tools Name
- Hacking Tools For Windows
- World No 1 Hacker Software
- Hacker Hardware Tools
- Hacking Tools For Games
- Hacker Tool Kit
- Hacking Tools Usb
- Hacking Tools Free Download
- Pentest Tools Website
- Hack Tools Pc
- Best Hacking Tools 2020
- Hacker Tools For Pc
- Hack Tools Online
- Blackhat Hacker Tools
- Bluetooth Hacking Tools Kali
- Hacking Apps
- Hack App
- Pentest Tools Open Source
- Hacker Hardware Tools
- Hacks And Tools
- Hack Tools For Ubuntu
- What Are Hacking Tools
- Pentest Tools Android
- Hacker Tools Apk
- Hacking Tools Kit
- Termux Hacking Tools 2019
- Easy Hack Tools
- Hacking Tools Usb
- Hacking Tools Windows 10
- Hacking Tools Online
- Hacker Techniques Tools And Incident Handling
- Nsa Hack Tools
- Pentest Tools Download
- Nsa Hack Tools Download
- Pentest Tools Review
- Hack Rom Tools
- Hacker Tools 2019
- Growth Hacker Tools
- Ethical Hacker Tools
- Pentest Tools Kali Linux
- Hacking Apps
- Best Hacking Tools 2020
- Hacks And Tools
- Ethical Hacker Tools
- Hacker Tools For Mac
- Pentest Recon Tools
- Pentest Tools Framework
- Hacking Tools Mac
- Ethical Hacker Tools
- Pentest Tools Open Source
- Hacking Tools Usb
- Hack Tools 2019
- Hacker Tools For Pc
- Pentest Tools Tcp Port Scanner
- Hacking Tools Kit
- Hacker Tools For Ios
- Pentest Tools Framework
- Hacker Tools Github
- Hacker Tools Apk
- Physical Pentest Tools
- Hacker Tools 2020
- How To Hack
- Free Pentest Tools For Windows
- Usb Pentest Tools
No comments:
Post a Comment