When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
Related links35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…- Pentest Tools Android
- Hacking Tools Kit
- Hacking Tools Pc
- How To Hack
- Hacker Tools Hardware
- Hacking Tools For Games
- Hacker Tools For Ios
- Hacking Tools Hardware
- Hacking Tools Github
- Github Hacking Tools
- Pentest Tools List
- Hack Tools Pc
- Pentest Tools Open Source
- Hacker Tools Github
- Hacking Tools And Software
- Hacking Tools
- Hacking Tools For Windows Free Download
- Termux Hacking Tools 2019
- Tools Used For Hacking
- Underground Hacker Sites
- Hacker Tools Linux
- Usb Pentest Tools
- Pentest Tools Free
- Pentest Box Tools Download
- Best Hacking Tools 2020
- Hacking Tools Mac
- Hacker Techniques Tools And Incident Handling
- New Hacker Tools
- Hacker Hardware Tools
- Pentest Tools For Mac
- Wifi Hacker Tools For Windows
- Install Pentest Tools Ubuntu
- Pentest Box Tools Download
- Hacker Tools
- Hacker Tools For Ios
- Usb Pentest Tools
- How To Make Hacking Tools
- Hacker Techniques Tools And Incident Handling
- Hackrf Tools
- Underground Hacker Sites
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Free
- Best Hacking Tools 2020
- Kik Hack Tools
- Termux Hacking Tools 2019
- Hacker Hardware Tools
- Beginner Hacker Tools
- Hak5 Tools
- Hack Rom Tools
- Hacking Tools For Windows Free Download
- Hacking Tools Hardware
- Hacker Tools Apk Download
- Best Hacking Tools 2019
- Pentest Tools Website Vulnerability
- Underground Hacker Sites
- Pentest Tools Open Source
- Termux Hacking Tools 2019
- Android Hack Tools Github
- Growth Hacker Tools
- Kik Hack Tools
- Hacking Tools Software
- Wifi Hacker Tools For Windows
- Pentest Reporting Tools
- Hacker Tools
- Pentest Tools For Windows
- Hack Tools For Windows
- Hacking Apps
- Hacker Tools Apk Download
- Underground Hacker Sites
- Kik Hack Tools
- Pentest Tools Linux
- Hack Tools For Mac
- Free Pentest Tools For Windows
- Pentest Tools Nmap
- Hacking Tools Download
- Ethical Hacker Tools
- Hacker Tools List
- Pentest Tools Nmap
- Hack Apps
- Bluetooth Hacking Tools Kali
- Hack Tools Pc
- Hackrf Tools
- Blackhat Hacker Tools
- Hack Tools For Windows
- Hacker Tools 2020
- Hacker Search Tools
- Hacker Search Tools
- New Hack Tools
- Hacking Apps
- Hacking Tools And Software
- Hackers Toolbox
- What Is Hacking Tools
- Pentest Tools Kali Linux
- Ethical Hacker Tools
- Hacker Tools Linux
- Pentest Tools Website Vulnerability
- New Hacker Tools
- Pentest Automation Tools
- Hack App
- Hacker Tools Windows
- Best Hacking Tools 2020
- Hacker Tools Windows
- Hacker Tools For Windows
- Black Hat Hacker Tools
- Hacker Tools Mac
- Hacker Tools Linux
- Hacker Tools Hardware
- Hack Tools Online
- Pentest Tools Open Source
- Hack Tools Online
- Hacker Tools Software
- Hacking Tools For Mac
- Hack Apps
- Hacking Tools Software
- Top Pentest Tools
- Nsa Hacker Tools
- Pentest Tools Subdomain
- Easy Hack Tools
- Hack Tools Download
- Hack Rom Tools
- Game Hacking
- Hacking Tools Online
- Hack Tool Apk No Root
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Open Source
- How To Hack
- Pentest Tools For Mac
- Hack Tool Apk
- Hack Rom Tools
- Hacking Tools 2019
- Pentest Tools Open Source
- Hacking Tools Free Download
- Hacking Tools Pc
- Hack Tools Mac
- Beginner Hacker Tools
- Hack Tools Download
- Game Hacking
- Best Hacking Tools 2019
- Pentest Tools For Android
- Top Pentest Tools
- Hacking Tools For Mac
- Wifi Hacker Tools For Windows
- Pentest Tools
- Hacker Hardware Tools
- Hacking Tools Kit
- Hacking Tools Free Download
- Pentest Tools List
- Hacker Hardware Tools
- Hack Tools Download
- Game Hacking
- Hacker Tools For Ios
- Pentest Tools Open Source
No comments:
Post a Comment