When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
Related word35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…- Hack Tools Mac
- Hacking Tools 2019
- Hack Website Online Tool
- Hack Tools Pc
- Game Hacking
- Github Hacking Tools
- Hacking Tools Windows 10
- Pentest Tools Alternative
- Hacking Tools Software
- Pentest Tools For Windows
- Hack And Tools
- Pentest Tools Subdomain
- Best Pentesting Tools 2018
- Hacker Tools Free Download
- Hack Tools For Mac
- Hacker Tools Free Download
- How To Install Pentest Tools In Ubuntu
- Hacker Tool Kit
- Computer Hacker
- Hacking Tools For Pc
- Pentest Tools Subdomain
- Pentest Tools Open Source
- Pentest Tools For Android
- Hack Tools Pc
- Hacker Tools For Windows
- Hack And Tools
- Tools For Hacker
- Hacker Tools 2019
- Pentest Tools For Windows
- Pentest Tools Review
- Hacker Tools For Windows
- Hacker Tools Hardware
- Hacking Apps
- Hacking Apps
- Pentest Tools Linux
- Hacker Tools For Mac
- Pentest Tools Bluekeep
- Hack Tools Pc
- Free Pentest Tools For Windows
- Hacker Security Tools
- Kik Hack Tools
- Pentest Reporting Tools
- Hacking Tools Name
- Pentest Tools Open Source
- Hack Tools For Games
- Hacking App
- Hacks And Tools
- Hacker Tools For Windows
- Pentest Tools For Mac
- Hack Tools For Windows
- Hacker Tools Github
- Free Pentest Tools For Windows
- Hacker Tools List
- Hacking Tools For Windows Free Download
- Hacker Hardware Tools
- Hacking Tools For Beginners
- Blackhat Hacker Tools
- Hack Tools Pc
- Hack Rom Tools
- Hacker Tool Kit
- Free Pentest Tools For Windows
- What Is Hacking Tools
- Hacker Tools 2020
- Hacking Tools For Mac
- Hacker Security Tools
- Pentest Tools For Windows
- Nsa Hack Tools
- Hack Tools
- Pentest Tools Subdomain
- Hacking Tools Download
- Hacker Tools Apk
- Beginner Hacker Tools
- Hack Tool Apk No Root
- Hacking Apps
- Hacker
- Tools 4 Hack
- Hack Tools Mac
- Pentest Recon Tools
- Pentest Tools Free
- Pentest Tools Linux
- Pentest Tools Framework
- Hacking Apps
- Hacking Tools Windows
- Install Pentest Tools Ubuntu
- Hack Tool Apk
- Hack Tools
- Hacking Tools Kit
- Tools 4 Hack
- Hacker Tools Online
- Pentest Tools Apk
- Pentest Tools For Mac
- Pentest Tools Find Subdomains
- Pentest Tools Framework
- Hacker Hardware Tools
- Hacking Tools Software
- Pentest Box Tools Download
- Hacker Tool Kit
- Hacker Tools Linux
- Ethical Hacker Tools
- How To Install Pentest Tools In Ubuntu
- Install Pentest Tools Ubuntu
- What Is Hacking Tools
- Bluetooth Hacking Tools Kali
- Top Pentest Tools
- Pentest Tools Github
- Hacker Tools Online
- Pentest Reporting Tools
- Termux Hacking Tools 2019
- Hack Tools For Ubuntu
- Physical Pentest Tools
- Hacks And Tools
- Pentest Tools Linux
- Best Hacking Tools 2019
- Hacking Tools Pc
- Pentest Tools Bluekeep
- Pentest Tools Bluekeep
- Underground Hacker Sites
- Bluetooth Hacking Tools Kali
- Hacker Tools Hardware
- Hackrf Tools
- Hack Tools For Mac
- Pentest Tools Website
- Free Pentest Tools For Windows
- Free Pentest Tools For Windows
- Hacking Tools Windows 10
- Bluetooth Hacking Tools Kali
- Hacking Tools 2019
- Hacking Tools For Games
- Hacking Tools Download
- Hacking Tools For Beginners
- Physical Pentest Tools
- New Hacker Tools
- Hacker Security Tools
- Pentest Tools Url Fuzzer
- How To Install Pentest Tools In Ubuntu
- Hack Tools For Ubuntu
- Hacking Tools Usb
- Hacking Tools Windows
- Hack Tools For Mac
- Pentest Tools For Android
- How To Install Pentest Tools In Ubuntu
- Bluetooth Hacking Tools Kali
- What Is Hacking Tools
- Hacker Tool Kit
- How To Install Pentest Tools In Ubuntu
No comments:
Post a Comment