Friday, August 28, 2020

New Printers Vulnerable To Old Languages

When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.

35 year old bugs features

The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
  • Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
  • Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
  • List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
  • Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
  • Launch denial of Service attacks of various kinds:

Now exploitable from the web

All attacks can be carried out by anyone who can print, which includes:
Note that the product was tested in the default configuration. To be fair, one has to say that the HP PageWide Color Flow MFP 586 allows strong, Kerberos based user authentication. The permission to print, and therefore to attack the device, can be be limited to certain employees, if configured correctly. The attacks can be easily reproduced using our PRET software. We informed HP's Software Security Response Team (SSRT) in February.

Conclusion: Christian Slater is right

PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…

Read more


  1. Hak5 Tools
  2. Hacking App
  3. Best Hacking Tools 2019
  4. Free Pentest Tools For Windows
  5. Hackrf Tools
  6. Pentest Tools Framework
  7. Top Pentest Tools
  8. Android Hack Tools Github
  9. Tools 4 Hack
  10. Pentest Tools Windows
  11. Install Pentest Tools Ubuntu
  12. Hacking Tools Windows
  13. Hack Tools 2019
  14. Hacker Tools Github
  15. Hacking Tools
  16. Hacker Tools Github
  17. Hacking Tools Windows
  18. Hack Tools For Windows
  19. Hacker Tools Linux
  20. Bluetooth Hacking Tools Kali
  21. Physical Pentest Tools
  22. Easy Hack Tools
  23. Pentest Tools Android
  24. Pentest Tools Open Source
  25. Pentest Tools Online
  26. Pentest Tools For Windows
  27. Blackhat Hacker Tools
  28. Hacker Tools 2019
  29. Hacking Tools Hardware
  30. Hacking Tools Name
  31. What Are Hacking Tools
  32. Hack Tools For Games
  33. Growth Hacker Tools
  34. Hacking Tools Github
  35. How To Install Pentest Tools In Ubuntu
  36. Hacking Tools For Kali Linux
  37. Hack Tools Pc
  38. Pentest Tools Github
  39. Hacking Tools For Kali Linux
  40. Hack Tool Apk No Root
  41. Hack Tools
  42. Hacker Tools Apk
  43. Hacking Tools Online
  44. New Hacker Tools
  45. Growth Hacker Tools
  46. Hacker Tools Apk Download
  47. Pentest Box Tools Download
  48. Pentest Tools Port Scanner
  49. Pentest Tools Tcp Port Scanner
  50. Pentest Tools Free
  51. Nsa Hacker Tools
  52. Pentest Tools Review
  53. Hack Tools Pc
  54. Pentest Tools Apk
  55. Usb Pentest Tools
  56. Hacker Tools Online
  57. Best Hacking Tools 2019
  58. Hacking Tools Download
  59. Hack Apps
  60. Hack Tools Pc
  61. Hack Tool Apk No Root
  62. Pentest Tools Review
  63. Ethical Hacker Tools
  64. Hack Tools For Mac
  65. Hacking Tools Free Download
  66. Hacking Tools For Windows
  67. Hack Tools Online
  68. Pentest Tools Online
  69. New Hack Tools
  70. Wifi Hacker Tools For Windows
  71. Hacker Tools For Mac
  72. Pentest Tools Github
  73. Black Hat Hacker Tools
  74. Pentest Tools Url Fuzzer
  75. Pentest Tools
  76. Pentest Tools Apk
  77. Usb Pentest Tools
  78. Hacker Tools
  79. Nsa Hacker Tools
  80. Hack And Tools
  81. Ethical Hacker Tools
  82. Hacking Tools For Windows
  83. Hack Tools Online
  84. Pentest Box Tools Download
  85. Hack Tools For Games
  86. Hack Tools For Mac
  87. Hacking Tools For Pc
  88. Hack App
  89. Hack Website Online Tool
  90. Hack Tool Apk No Root
  91. Hacker Tools Apk
  92. Pentest Tools Online
  93. Underground Hacker Sites
  94. Hacking Tools For Games
  95. New Hacker Tools
  96. Nsa Hack Tools Download
  97. Black Hat Hacker Tools
  98. Hacker Hardware Tools
  99. Hack Apps
  100. Pentest Tools Online
  101. Hacking Tools Usb
  102. Hacking Tools For Kali Linux
  103. Pentest Tools Framework
  104. Tools For Hacker
  105. Tools For Hacker
  106. Best Hacking Tools 2019
  107. Hack Tools For Games
  108. Usb Pentest Tools
  109. Pentest Tools
  110. New Hacker Tools
  111. Underground Hacker Sites
  112. Pentest Tools Apk
  113. Nsa Hack Tools
  114. Growth Hacker Tools
  115. Hack Website Online Tool
  116. Pentest Tools Review
  117. Tools 4 Hack
  118. Best Hacking Tools 2019
  119. Best Hacking Tools 2019
  120. Nsa Hack Tools
  121. Pentest Tools Linux
  122. Pentest Recon Tools
  123. Hack App
  124. Pentest Automation Tools
  125. Pentest Tools Website
  126. Hak5 Tools
  127. Pentest Tools Website
  128. Usb Pentest Tools
  129. Hacking Tools For Windows
  130. Hack Tool Apk No Root
  131. Pentest Tools Find Subdomains
  132. Underground Hacker Sites
  133. Hacker Tools Mac
  134. Pentest Tools Apk
  135. Hacker Tools For Mac
  136. Hack Tools Download
  137. Hacker Tools
  138. Hacking Tools Pc
  139. Hacker Tools Mac
  140. Hacker Tools Free Download
  141. Best Hacking Tools 2019
  142. Hack Website Online Tool
  143. Pentest Tools Website Vulnerability
  144. Nsa Hacker Tools
  145. Hacker Tools Free
  146. Hacking Tools For Windows Free Download
  147. Hacker Tools Windows
  148. Hacking Tools Usb
  149. Hacker Tools Apk
  150. Hacking Tools Name
  151. Hacker Tools For Mac
  152. Tools Used For Hacking
  153. Hacking Tools Mac
  154. Hack Tools Github
  155. Hacker Search Tools
  156. Computer Hacker

No comments: