When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…Related articles
- Pentest Tools Github
- Hacker Tools Free Download
- Hacking Tools For Beginners
- Hack Tools Download
- Hack And Tools
- Pentest Tools Bluekeep
- Hacking Tools Hardware
- Pentest Tools Download
- Hackers Toolbox
- Hacking Tools Free Download
- Hacking Tools And Software
- Hacker Tools Windows
- Hacker
- World No 1 Hacker Software
- Hack Tools
- Termux Hacking Tools 2019
- Free Pentest Tools For Windows
- Hacking Tools For Kali Linux
- Hacker Tools Linux
- Beginner Hacker Tools
- Hacker
- Github Hacking Tools
- Hacking Tools And Software
- Hacking Tools For Pc
- Hacking Tools Pc
- Pentest Tools Tcp Port Scanner
- Hacker Tools Windows
- Tools 4 Hack
- Best Hacking Tools 2019
- Pentest Tools Linux
- Pentest Tools
- Blackhat Hacker Tools
- Pentest Tools Free
- Hacking Tools
- Kik Hack Tools
- Hacker Tools Linux
- Hacker Tool Kit
- Hacker Tools For Windows
- Nsa Hack Tools Download
- Hacking Tools Github
- What Are Hacking Tools
- Hacker Tools 2020
- Pentest Tools
- Pentest Reporting Tools
- Hack Rom Tools
- Hacking Tools For Windows 7
- Pentest Tools Website
- Hack Apps
- Pentest Tools Nmap
- Pentest Tools Linux
- Hacker Tool Kit
- Hack Tools 2019
- Hacker Tools For Ios
- Install Pentest Tools Ubuntu
- Best Hacking Tools 2019
- Hackers Toolbox
- New Hack Tools
- Hacking Tools Usb
- Hacker Tools Apk Download
- Hacker Tools For Ios
- Hacker Tools Apk
- New Hacker Tools
- Hacking Tools Download
- Hacking Tools Windows
- Termux Hacking Tools 2019
- Hacker Tools Apk Download
- Nsa Hacker Tools
- Hacking Tools Download
- Nsa Hack Tools
- Hacker Tools Mac
- Hacking Tools 2020
- Hak5 Tools
- Hacker Tools Linux
- Hack Tools For Pc
- Pentest Tools Bluekeep
- Pentest Tools Download
- Hack Tools
- Pentest Tools Alternative
- Hacking Tools For Mac
- Hacking Tools Software
- Hacking Tools Name
- Pentest Tools Nmap
- Tools 4 Hack
- Computer Hacker
- Hacking Tools Software
- Hack Tools For Mac
- Pentest Tools Tcp Port Scanner
- Pentest Tools For Ubuntu
- Pentest Tools Kali Linux
- Pentest Tools For Windows
- Game Hacking
- Hacker Tools 2019
- Hacker Tools Apk Download
- Free Pentest Tools For Windows
- Kik Hack Tools
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Windows
- Hacking Tools 2020
- Underground Hacker Sites
- Termux Hacking Tools 2019
- Hacking Tools And Software
- Hacker Tools Apk Download
- Termux Hacking Tools 2019
- Hacking Tools Windows
- Hacker Tool Kit
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Free Download
- Hacker Tools Hardware
- Pentest Tools Nmap
- Pentest Tools Review
- New Hack Tools
- Bluetooth Hacking Tools Kali
- Android Hack Tools Github
- Growth Hacker Tools
- Easy Hack Tools
- What Is Hacking Tools
- Hacking Tools For Windows
- Hacking Tools For Mac
- Hacker Tools List
- Pentest Tools Open Source
- Pentest Tools Framework
- Hack Tools For Mac
- Hacker Tool Kit
- Best Pentesting Tools 2018
- Hacking Tools For Mac
- Usb Pentest Tools
- Kik Hack Tools
- Hacker Tool Kit
- Hack Tools For Games
- Pentest Tools Website
- Hacking Tools And Software
- Pentest Tools Apk
- Hackrf Tools
- New Hack Tools
- Hacks And Tools
- Pentest Tools Windows
- Hack Tools 2019
- Hacking Tools 2019
- Hack App
- Hacking Tools Software
- Hacking Tools For Kali Linux
- Hacking Tools For Beginners
- Hacking Tools 2020
- Pentest Tools For Ubuntu
No comments:
Post a Comment