When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…More information
- Hacker Tools Github
- Hacking Tools For Windows 7
- New Hack Tools
- Hacker Tools 2019
- Pentest Tools Find Subdomains
- Tools 4 Hack
- Pentest Tools Find Subdomains
- Hacker Tools 2019
- Nsa Hack Tools
- Hacker Tools Github
- Hacking Tools
- Hack Tools
- Hacking Tools Windows
- Pentest Tools Nmap
- Hacker Tools Windows
- Hacking Tools Usb
- Hacking Tools Hardware
- Hacking Apps
- Nsa Hack Tools
- Pentest Tools Nmap
- Hacking Tools For Windows Free Download
- What Is Hacking Tools
- Hack App
- Hak5 Tools
- Hacker Tools Hardware
- Hack Tools 2019
- Ethical Hacker Tools
- Pentest Tools Open Source
- Usb Pentest Tools
- Hacker Tools Github
- Pentest Tools Alternative
- Hack Tools For Games
- Pentest Tools Tcp Port Scanner
- Hacking Tools Github
- New Hacker Tools
- Pentest Tools Windows
- Underground Hacker Sites
- Hacks And Tools
- Hacker Tools Apk
- Hacking Tools 2019
- Install Pentest Tools Ubuntu
- How To Install Pentest Tools In Ubuntu
- New Hacker Tools
- Beginner Hacker Tools
- Pentest Tools For Windows
- Android Hack Tools Github
- Hacking Tools For Windows Free Download
- Wifi Hacker Tools For Windows
- Hack Tools Mac
- Top Pentest Tools
- Hacking Tools 2019
- Hacker Tools For Ios
- What Are Hacking Tools
- Hack Rom Tools
- Hacker Security Tools
- Hacking Tools Usb
- Tools For Hacker
- Pentest Tools Github
- Pentest Tools List
- How To Make Hacking Tools
- Hack Tools Pc
- Hacker Tools Free Download
- World No 1 Hacker Software
- Hack And Tools
- Pentest Tools Open Source
- Pentest Recon Tools
- Hack Tools Pc
- Hacker Tools Windows
- Best Pentesting Tools 2018
- Tools 4 Hack
- Hacker Tools
- Hack Tools For Pc
- Hacker Tool Kit
- How To Install Pentest Tools In Ubuntu
- Hacker Tools For Ios
- Hacking Tools Hardware
- Hackrf Tools
- Hackrf Tools
- Hacking Tools Online
- Hack Tools Mac
- Hacker
- Tools 4 Hack
- Pentest Tools Port Scanner
- Pentest Tools Open Source
- Hack Website Online Tool
- Install Pentest Tools Ubuntu
- Hacking Tools For Windows
- Android Hack Tools Github
- Hacker Tools Free Download
- Hacker Tools Hardware
- Beginner Hacker Tools
- Pentest Tools Port Scanner
- Hacking Tools For Windows
- Hacking Tools For Windows Free Download
- Hacking Tools Download
- Hacker Techniques Tools And Incident Handling
- How To Hack
- Hacker Tools Software
- Hack Tools For Pc
- Pentest Tools Apk
- Hacker
- Pentest Tools List
- Hacker Techniques Tools And Incident Handling
- Nsa Hack Tools Download
- How To Hack
- Hacker Tools Hardware
- Hacker Tool Kit
- Bluetooth Hacking Tools Kali
- Hacking Tools For Windows Free Download
- Pentest Tools Bluekeep
- Pentest Tools Tcp Port Scanner
- How To Make Hacking Tools
- Hack Apps
- Bluetooth Hacking Tools Kali
- What Are Hacking Tools
- Hacking Tools Download
- Hacking Tools Hardware
- Hack And Tools
- Pentest Tools Windows
- How To Hack
- Hack Tool Apk No Root
- Hacker Tools Mac
- Pentest Tools Free
- Hacker Tools Mac
- Hacker Tools For Windows
- Hacker Tools Apk
- Pentest Tools Android
- Hacker Search Tools
- Hack Tools For Ubuntu
- Hack Rom Tools
No comments:
Post a Comment