When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…More articles
- Computer Hacker
- Pentest Automation Tools
- Hacking Tools For Windows Free Download
- Wifi Hacker Tools For Windows
- Install Pentest Tools Ubuntu
- Hack Tools For Ubuntu
- Hacker Tools Apk Download
- Hack Tools
- Hack App
- Hackers Toolbox
- Pentest Tools Apk
- Tools 4 Hack
- Hacking Tools Mac
- Pentest Tools Framework
- Physical Pentest Tools
- Hacking Tools Hardware
- Pentest Automation Tools
- What Is Hacking Tools
- Pentest Tools Apk
- Github Hacking Tools
- Hacking Tools Software
- Hacker Tools For Mac
- Hack Tools Pc
- Pentest Tools Nmap
- Blackhat Hacker Tools
- Hacking Tools Usb
- Pentest Tools
- Tools Used For Hacking
- Best Hacking Tools 2020
- Hacking Tools For Mac
- How To Hack
- Hacking Tools 2019
- Hacker Tools Windows
- Pentest Tools Review
- Hacking Tools For Windows 7
- Hacking Tools Windows 10
- Underground Hacker Sites
- Hack Tools 2019
- Usb Pentest Tools
- Free Pentest Tools For Windows
- Hacking Tools Name
- Hacker Tools 2019
- Pentest Tools Kali Linux
- Hacker Tools Software
- Pentest Automation Tools
- Hacker Tools Apk
- Blackhat Hacker Tools
- Hack Tools 2019
- Hacking Tools Free Download
- Hack And Tools
- Pentest Box Tools Download
- Physical Pentest Tools
- Nsa Hacker Tools
- Easy Hack Tools
- Hacker Security Tools
- Physical Pentest Tools
- Hacker Security Tools
- Hack Tool Apk
- Hack Tools Github
- Best Hacking Tools 2020
- Ethical Hacker Tools
- Hack Tools Online
- Hacker Tools Apk
- Hacker Tools Free
- Pentest Tools Kali Linux
- Pentest Tools Find Subdomains
- Blackhat Hacker Tools
- Hack App
- Hacker Tools Linux
- Pentest Tools Apk
- Pentest Tools Android
- Hacking Tools Online
- Hack Tools Online
- Pentest Tools For Ubuntu
- Hackers Toolbox
- Hacking Tools 2019
- Beginner Hacker Tools
- Pentest Reporting Tools
- Hacker Tools For Windows
- Pentest Tools For Windows
- Hacking Tools For Windows
- Hacking Tools For Pc
- Computer Hacker
- Hackrf Tools
- Pentest Tools Android
- Hacking Tools For Kali Linux
- Hacking Tools 2019
- Hacking Tools Free Download
- Hack Rom Tools
- Pentest Tools For Mac
- Pentest Tools Github
- Hack Tool Apk No Root
- Hack Tools For Mac
- Hacking Tools Name
- Pentest Tools Android
- Pentest Tools For Android
- Hack Tools Pc
- Hacker Security Tools
- What Is Hacking Tools
- Pentest Tools Android
- Hacking Tools Name
- Hacking Tools For Beginners
- Tools For Hacker
- Best Hacking Tools 2019
- World No 1 Hacker Software
- Hacker Tools Apk Download
- Android Hack Tools Github
- Hack Tools Pc
- Hack Tools Mac
- Pentest Box Tools Download
- Hack Tools For Ubuntu
- Nsa Hack Tools
- Hacker Tools For Ios
- Pentest Tools For Mac
- Hack Tools Online
- Hacker Tools Github
- Hacking Tools Kit
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Kit
- Hack App
- Hack Tools
- Hacker Tools Linux
- Hack Apps
- Hacking Tools For Mac
- Hacking Tools For Windows
- Underground Hacker Sites
- Pentest Tools For Windows
- Underground Hacker Sites
- Pentest Tools For Windows
- Hacking Tools For Windows 7
- Hack And Tools
- Hacking Tools For Beginners
- Pentest Tools Apk
- Tools Used For Hacking
- Hacker Tools Free Download
- Hack Tools For Windows
- Pentest Tools Download
- Tools For Hacker
- Pentest Tools
- Hacking Tools Github
- Hacker Security Tools
- How To Make Hacking Tools
- Hack Website Online Tool
- Game Hacking
- Hacker Tools 2019
- Top Pentest Tools
- Best Hacking Tools 2019
- Pentest Tools Bluekeep
- Game Hacking
- Hacking Tools For Windows 7
- Hack Tools Mac
- Hack Tools
- Hack Apps
- Pentest Tools Alternative
- Hacker
- Hack Tools Pc
- Usb Pentest Tools
- Hacker Tools Mac
- Hacking Tools
- Computer Hacker
- Hack Tools For Games
- Hacking Tools
- Hacker Tools Apk
- Hacker Security Tools
- Kik Hack Tools
- Hack Tools
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Github
No comments:
Post a Comment