When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…Read more
- Hak5 Tools
- Hacking App
- Best Hacking Tools 2019
- Free Pentest Tools For Windows
- Hackrf Tools
- Pentest Tools Framework
- Top Pentest Tools
- Android Hack Tools Github
- Tools 4 Hack
- Pentest Tools Windows
- Install Pentest Tools Ubuntu
- Hacking Tools Windows
- Hack Tools 2019
- Hacker Tools Github
- Hacking Tools
- Hacker Tools Github
- Hacking Tools Windows
- Hack Tools For Windows
- Hacker Tools Linux
- Bluetooth Hacking Tools Kali
- Physical Pentest Tools
- Easy Hack Tools
- Pentest Tools Android
- Pentest Tools Open Source
- Pentest Tools Online
- Pentest Tools For Windows
- Blackhat Hacker Tools
- Hacker Tools 2019
- Hacking Tools Hardware
- Hacking Tools Name
- What Are Hacking Tools
- Hack Tools For Games
- Growth Hacker Tools
- Hacking Tools Github
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Kali Linux
- Hack Tools Pc
- Pentest Tools Github
- Hacking Tools For Kali Linux
- Hack Tool Apk No Root
- Hack Tools
- Hacker Tools Apk
- Hacking Tools Online
- New Hacker Tools
- Growth Hacker Tools
- Hacker Tools Apk Download
- Pentest Box Tools Download
- Pentest Tools Port Scanner
- Pentest Tools Tcp Port Scanner
- Pentest Tools Free
- Nsa Hacker Tools
- Pentest Tools Review
- Hack Tools Pc
- Pentest Tools Apk
- Usb Pentest Tools
- Hacker Tools Online
- Best Hacking Tools 2019
- Hacking Tools Download
- Hack Apps
- Hack Tools Pc
- Hack Tool Apk No Root
- Pentest Tools Review
- Ethical Hacker Tools
- Hack Tools For Mac
- Hacking Tools Free Download
- Hacking Tools For Windows
- Hack Tools Online
- Pentest Tools Online
- New Hack Tools
- Wifi Hacker Tools For Windows
- Hacker Tools For Mac
- Pentest Tools Github
- Black Hat Hacker Tools
- Pentest Tools Url Fuzzer
- Pentest Tools
- Pentest Tools Apk
- Usb Pentest Tools
- Hacker Tools
- Nsa Hacker Tools
- Hack And Tools
- Ethical Hacker Tools
- Hacking Tools For Windows
- Hack Tools Online
- Pentest Box Tools Download
- Hack Tools For Games
- Hack Tools For Mac
- Hacking Tools For Pc
- Hack App
- Hack Website Online Tool
- Hack Tool Apk No Root
- Hacker Tools Apk
- Pentest Tools Online
- Underground Hacker Sites
- Hacking Tools For Games
- New Hacker Tools
- Nsa Hack Tools Download
- Black Hat Hacker Tools
- Hacker Hardware Tools
- Hack Apps
- Pentest Tools Online
- Hacking Tools Usb
- Hacking Tools For Kali Linux
- Pentest Tools Framework
- Tools For Hacker
- Tools For Hacker
- Best Hacking Tools 2019
- Hack Tools For Games
- Usb Pentest Tools
- Pentest Tools
- New Hacker Tools
- Underground Hacker Sites
- Pentest Tools Apk
- Nsa Hack Tools
- Growth Hacker Tools
- Hack Website Online Tool
- Pentest Tools Review
- Tools 4 Hack
- Best Hacking Tools 2019
- Best Hacking Tools 2019
- Nsa Hack Tools
- Pentest Tools Linux
- Pentest Recon Tools
- Hack App
- Pentest Automation Tools
- Pentest Tools Website
- Hak5 Tools
- Pentest Tools Website
- Usb Pentest Tools
- Hacking Tools For Windows
- Hack Tool Apk No Root
- Pentest Tools Find Subdomains
- Underground Hacker Sites
- Hacker Tools Mac
- Pentest Tools Apk
- Hacker Tools For Mac
- Hack Tools Download
- Hacker Tools
- Hacking Tools Pc
- Hacker Tools Mac
- Hacker Tools Free Download
- Best Hacking Tools 2019
- Hack Website Online Tool
- Pentest Tools Website Vulnerability
- Nsa Hacker Tools
- Hacker Tools Free
- Hacking Tools For Windows Free Download
- Hacker Tools Windows
- Hacking Tools Usb
- Hacker Tools Apk
- Hacking Tools Name
- Hacker Tools For Mac
- Tools Used For Hacking
- Hacking Tools Mac
- Hack Tools Github
- Hacker Search Tools
- Computer Hacker
No comments:
Post a Comment