When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…Related posts
- Easy Hack Tools
- Wifi Hacker Tools For Windows
- Hack Tools Github
- Pentest Tools Apk
- Hacking Tools Mac
- Pentest Automation Tools
- Pentest Tools Bluekeep
- Hack Rom Tools
- Hack App
- Hacker Tools Apk Download
- Pentest Tools List
- Hacking Tools Free Download
- Hack Apps
- Tools 4 Hack
- Pentest Tools Linux
- Nsa Hack Tools
- Github Hacking Tools
- New Hacker Tools
- Hacker Tools List
- Hack Tools Download
- Pentest Tools Windows
- Hacking Tools For Pc
- Hack And Tools
- Hacker Tools
- Computer Hacker
- What Are Hacking Tools
- Pentest Tools Kali Linux
- Hacking Tools For Windows Free Download
- Pentest Tools For Android
- Hacker Tools Apk
- Hackers Toolbox
- Hack Tools For Windows
- Pentest Tools Subdomain
- Pentest Tools Download
- Pentest Tools Open Source
- Pentest Tools For Windows
- Pentest Reporting Tools
- Hackrf Tools
- Android Hack Tools Github
- Black Hat Hacker Tools
- Pentest Tools Framework
- Free Pentest Tools For Windows
- Pentest Tools Bluekeep
- Hacking Tools Software
- Hack Tools Download
- New Hacker Tools
- Hacking Tools Mac
- Physical Pentest Tools
- Hack Website Online Tool
- Hackers Toolbox
- Pentest Tools Framework
- Hack Apps
- Tools Used For Hacking
- Pentest Tools Port Scanner
- Best Pentesting Tools 2018
- Pentest Tools Windows
- Hacking Tools Pc
- Pentest Tools Download
- How To Make Hacking Tools
- Hacker Tools Free Download
- Ethical Hacker Tools
- Hack Tools Github
- Hak5 Tools
- Hack Website Online Tool
- Hacker Tools Free
- Pentest Tools Framework
- Hacker Tools Mac
- Best Hacking Tools 2020
- Pentest Tools Github
- Nsa Hacker Tools
- Beginner Hacker Tools
- Hack Tools Online
- Pentest Tools Open Source
- Hacking Tools Windows
- Pentest Tools List
- Pentest Tools Windows
- Hacker Tools Mac
- Pentest Tools For Ubuntu
- Hacker Tools For Mac
- Pentest Tools For Mac
- Hacker Tools Apk
- Pentest Tools For Windows
- Pentest Tools Free
- Hacking Tools And Software
- Hacking Tools 2020
- Free Pentest Tools For Windows
- Pentest Tools Website
- Ethical Hacker Tools
- Pentest Automation Tools
- Hacker Tools For Ios
- Pentest Tools
- Hacker Tool Kit
- Hacker Tools 2019
- Hacker Tools Linux
- Pentest Tools Online
- Hack Tools Pc
- What Is Hacking Tools
- Best Hacking Tools 2020
- Ethical Hacker Tools
- Hacking Tools For Pc
- Hacking Tools Mac
- Hack Tools For Windows
- Hacking Tools For Beginners
- Hack App
- Hacker Tools For Pc
- Pentest Tools Find Subdomains
- Pentest Tools Kali Linux
- Hacking Tools Download
- Pentest Tools Url Fuzzer
- Hacker Tools For Pc
- Top Pentest Tools
- Hack Tools 2019
- Pentest Tools Port Scanner
- Pentest Tools Free
- Hacker Security Tools
- Pentest Tools For Ubuntu
- Game Hacking
- Hacking Tools For Mac
- Hacker Tools For Mac
- Hacker Tools Apk Download
- Pentest Tools Linux
- Hack Rom Tools
- Best Hacking Tools 2019
- Hacker Tools
- Hacker Hardware Tools
- Easy Hack Tools
- Hack Tools
- Hacker Tools Software
- Pentest Tools Apk
- Hack Tools 2019
- Github Hacking Tools
- Hacking Tools Mac
- Hacking Tools Pc
- Wifi Hacker Tools For Windows
- Pentest Tools Download
- Pentest Tools Tcp Port Scanner
- Hacker Tools List
- Hacking Tools Github
- Hacker Search Tools
- Hack Tools For Mac
- Growth Hacker Tools
- Termux Hacking Tools 2019
- How To Hack
- Pentest Tools Website
- Tools Used For Hacking
- Hacking Tools Name
- Pentest Tools Open Source
- Hacker Tool Kit
- Pentest Tools Kali Linux
- Pentest Tools Github
- Pentest Tools List
- Hacker Tools Online
- Hacking Tools 2020
- Hacking Tools For Kali Linux
- How To Make Hacking Tools
- Hack Apps
- Hack Tool Apk No Root
- Hacker Tools 2020
- Pentest Automation Tools
- Hacker Tools Github
- Hacking Tools For Windows Free Download
- Underground Hacker Sites
- Hacker Tools For Ios
- Pentest Tools Framework
- Hack Tools For Ubuntu
- Hackrf Tools
No hay comentarios:
Publicar un comentario