When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…Related links
- Pentest Tools For Android
- Hacking Tools Usb
- Best Pentesting Tools 2018
- Hacker Tools Linux
- Black Hat Hacker Tools
- Black Hat Hacker Tools
- Kik Hack Tools
- Hacker
- Pentest Tools Website
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Online
- Hack Tools 2019
- Hacker Tools For Windows
- Hacker Tools Linux
- Physical Pentest Tools
- Bluetooth Hacking Tools Kali
- Hacker Techniques Tools And Incident Handling
- World No 1 Hacker Software
- Pentest Tools Bluekeep
- Best Hacking Tools 2019
- Pentest Tools Port Scanner
- New Hacker Tools
- Hacker Tools Apk
- Pentest Tools Linux
- Hacker Tools Mac
- Hack Tools For Games
- Hacking Tools Usb
- Hacker Tools For Windows
- Hacking Tools 2020
- Hacking Tools And Software
- Hacking Tools Usb
- Pentest Tools Alternative
- Hacking Tools Hardware
- Hacking Tools For Windows Free Download
- Hacker Tools Mac
- Hack Tools For Mac
- Hackers Toolbox
- Hacker Tools For Mac
- Pentest Tools Download
- Pentest Tools For Ubuntu
- Hacker Tools Windows
- Pentest Automation Tools
- Nsa Hack Tools Download
- Hacking App
- Underground Hacker Sites
- Hacking Tools Online
- Hack Apps
- Tools 4 Hack
- Github Hacking Tools
- Nsa Hack Tools Download
- Hack Tools For Mac
- Hacker Tools Free Download
- Pentest Tools Website
- Pentest Tools Framework
- Pentest Tools Find Subdomains
- Hacker Tools Mac
- Pentest Tools Online
- Pentest Tools Linux
- Pentest Tools List
- Termux Hacking Tools 2019
- Hacking Tools 2019
- Best Pentesting Tools 2018
- Pentest Tools Nmap
- Wifi Hacker Tools For Windows
- Pentest Tools Linux
- Pentest Tools Github
- Hacking Tools For Windows Free Download
- Pentest Tools Alternative
- Hacker Tools
- How To Make Hacking Tools
- New Hacker Tools
- Hacking Tools Mac
- Pentest Tools Github
- Hackrf Tools
- Hacker Tools For Mac
- Hacker Tools Apk Download
- Hacker Security Tools
- Hacking Tools Usb
- Pentest Tools Github
- Hacker Tools For Mac
- Termux Hacking Tools 2019
- Hack Apps
- Pentest Tools Github
- Hacking Tools For Pc
- Free Pentest Tools For Windows
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Mac
- Hack Tool Apk No Root
- Hacking Tools Pc
- Hack Tools
- Top Pentest Tools
- Hack Tools For Ubuntu
- Nsa Hacker Tools
- Hacking Tools 2020
- How To Hack
- Android Hack Tools Github
- Hack App
- Hacking Tools For Pc
- Pentest Tools Website
- Pentest Tools Apk
- Hacking Tools Windows 10
- Pentest Tools Download
- Hacking Tools Kit
- Pentest Tools Windows
- Hacks And Tools
- Physical Pentest Tools
- Hack Website Online Tool
- Hacker Tools 2019
- Hacker Tools For Mac
- Hacker Tools Online
- Pentest Tools Apk
- Hacker Tools For Pc
- Hacking Tools For Kali Linux
- Pentest Tools Bluekeep
- Termux Hacking Tools 2019
- Hacks And Tools
- Pentest Tools Find Subdomains
- Pentest Tools Kali Linux
- Pentest Tools Alternative
- Game Hacking
- Hack Tool Apk No Root
- Hack Tools 2019
- Tools For Hacker
- Hacking Tools For Beginners
- Game Hacking
- Hacker Tools 2020
- Pentest Tools Apk
- Easy Hack Tools
- Black Hat Hacker Tools
- Hack Tools Pc
- Tools Used For Hacking
- Pentest Tools Website Vulnerability
- Pentest Tools For Windows
- Black Hat Hacker Tools
- Hacking Tools Name
- Hak5 Tools
- Android Hack Tools Github
- Hacker Tools Hardware
- What Is Hacking Tools
- Hacker Tools Free Download
- New Hacker Tools
- Hacker Tools Mac
- Hacker Tools Hardware
- Hacker Tools Github
- Hacker Tools Free Download
- Termux Hacking Tools 2019
- Pentest Tools Bluekeep
- Best Hacking Tools 2019
- Best Hacking Tools 2019
- Pentest Tools Bluekeep
- Physical Pentest Tools
- Hacker Search Tools
- Hack Tools For Windows
- Hack Apps
- Pentest Tools Nmap
- World No 1 Hacker Software
- Pentest Tools Linux
- Hackers Toolbox
- Hacking Tools Hardware
- Nsa Hack Tools
- Pentest Tools List
No comments:
Post a Comment