New Printers Vulnerable To Old Languages

When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.

35 year old bugs features

The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
  • Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
  • Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
  • List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
  • Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
  • Launch denial of Service attacks of various kinds:

Now exploitable from the web

All attacks can be carried out by anyone who can print, which includes:
Note that the product was tested in the default configuration. To be fair, one has to say that the HP PageWide Color Flow MFP 586 allows strong, Kerberos based user authentication. The permission to print, and therefore to attack the device, can be be limited to certain employees, if configured correctly. The attacks can be easily reproduced using our PRET software. We informed HP's Software Security Response Team (SSRT) in February.

Conclusion: Christian Slater is right

PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…

Related word

  1. Hacking Tools Name
  2. Pentest Tools Linux
  3. Hacking Tools Windows
  4. Pentest Reporting Tools
  5. Hacking Tools Mac
  6. Hacker Tools For Pc
  7. Hack Tool Apk
  8. Black Hat Hacker Tools
  9. Pentest Tools Kali Linux
  10. Best Hacking Tools 2020
  11. Hacker Security Tools
  12. Best Hacking Tools 2020
  13. Pentest Automation Tools
  14. Pentest Tools Open Source
  15. Hack Tool Apk
  16. Hack Tools For Ubuntu
  17. Computer Hacker
  18. Hacking App
  19. Growth Hacker Tools
  20. Pentest Tools Subdomain
  21. Pentest Tools List
  22. Pentest Tools Tcp Port Scanner
  23. Hacking Apps
  24. How To Make Hacking Tools
  25. Pentest Automation Tools
  26. Pentest Tools Alternative
  27. Top Pentest Tools
  28. Hacker Tools For Pc
  29. Pentest Tools Free
  30. Hacking Tools Free Download
  31. Hacking Tools For Mac
  32. Hacker Tools Apk
  33. Install Pentest Tools Ubuntu
  34. Hacking Tools Hardware
  35. Hack Tools Mac
  36. Pentest Tools Nmap
  37. Hack Tools For Mac
  38. Android Hack Tools Github
  39. Pentest Box Tools Download
  40. Hacking Tools Pc
  41. Hacking App
  42. Hacking Apps
  43. Hacker Tools Free Download
  44. Pentest Tools List
  45. Pentest Tools Download
  46. Pentest Tools Kali Linux
  47. Tools 4 Hack
  48. Hack Website Online Tool
  49. Hak5 Tools
  50. Tools 4 Hack
  51. Hacker Hardware Tools
  52. Hak5 Tools
  53. Pentest Tools Review
  54. Hacking Tools For Mac
  55. Hacker Tools Apk
  56. Hack Tools For Pc
  57. Hacker Tools Hardware
  58. Hack And Tools
  59. Hack Tools Mac
  60. Hacking Tools Software
  61. Hacker Tools Hardware
  62. Hacker Tools Windows
  63. Hacking Tools Online
  64. Pentest Tools Kali Linux
  65. Hack And Tools
  66. Hacker Tools List
  67. Pentest Tools Subdomain
  68. Hak5 Tools
  69. Hack Tools
  70. Hacking Tools Software
  71. Pentest Tools Online
  72. Hacker Tools For Windows
  73. Nsa Hacker Tools
  74. Pentest Box Tools Download
  75. Hack Tools Download
  76. Pentest Tools
  77. Hack Rom Tools
  78. Pentest Tools Windows
  79. Best Pentesting Tools 2018
  80. Hacker Hardware Tools
0 Responses

Post a Comment

abcs