When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.
35 year old
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…Related posts
- Hack Tools 2019
- Easy Hack Tools
- Best Hacking Tools 2020
- Pentest Reporting Tools
- Best Hacking Tools 2020
- Pentest Tools For Mac
- Nsa Hacker Tools
- Hacking Tools Pc
- Hacker Hardware Tools
- Pentest Tools Find Subdomains
- Tools Used For Hacking
- Pentest Tools Url Fuzzer
- Physical Pentest Tools
- Hacking Tools For Beginners
- Hack Website Online Tool
- Pentest Tools Find Subdomains
- Pentest Tools Windows
- Hack Tool Apk No Root
- Hacking Tools For Games
- Hack Tools Online
- Install Pentest Tools Ubuntu
- How To Hack
- Pentest Tools Alternative
- Hack Tools For Games
- Hack Tools For Mac
- Hacking Tools Kit
- Hack Tools For Pc
- Hacking Tools
- Hacks And Tools
- Top Pentest Tools
- Best Hacking Tools 2019
- Hacking Tools For Beginners
- New Hacker Tools
- Hackrf Tools
- Pentest Tools Linux
- World No 1 Hacker Software
- Hacker Tools
- Tools For Hacker
- Pentest Tools Windows
- Hacker Tools For Ios
- Ethical Hacker Tools
- Physical Pentest Tools
- Pentest Tools
- How To Hack
- Pentest Tools Kali Linux
- Hack Tools
- Hack Rom Tools
- Tools Used For Hacking
- Bluetooth Hacking Tools Kali
- Growth Hacker Tools
- Hack Tool Apk No Root
- Hack App
- Ethical Hacker Tools
- Bluetooth Hacking Tools Kali
- Hacker Tools List
- Hacking Tools For Beginners
- Hak5 Tools
- Hacking Tools Hardware
- New Hacker Tools
- Hacking Tools And Software
- Tools 4 Hack
- Pentest Tools For Mac
- Wifi Hacker Tools For Windows
- What Are Hacking Tools
- Hack Rom Tools
- Wifi Hacker Tools For Windows
- Hacking Tools For Pc
- Hacking Tools And Software
- Hacking Tools Pc
- Tools For Hacker
- Hack Tools For Mac
- Free Pentest Tools For Windows
- Pentest Recon Tools
- Hack App
- Nsa Hack Tools
- Pentest Tools For Windows
- Bluetooth Hacking Tools Kali
- Hack Tools Online
- Easy Hack Tools
- Hacker Tools Windows
- Hacker Tools For Mac
- Android Hack Tools Github
- Hacking Tools For Windows Free Download
- Usb Pentest Tools
- Pentest Tools Website Vulnerability
- Hacker Tools For Mac
- Hacker Tools Github
- Best Hacking Tools 2020
- Hacking Tools For Mac
- Hack Tools Pc
- Pentest Tools Apk
- Pentest Box Tools Download
- How To Make Hacking Tools
- Tools For Hacker
- Hacking Tools For Kali Linux
- Pentest Box Tools Download
- Hacking Tools For Kali Linux
- Nsa Hacker Tools
- New Hack Tools
- Termux Hacking Tools 2019
- Hacking Tools Mac
- Pentest Tools For Windows
- Hacker Tools Linux
- Pentest Tools Windows
- Top Pentest Tools
- Hacker Tools Mac
- Hak5 Tools
- Hacker Tools Mac
- Ethical Hacker Tools
- Free Pentest Tools For Windows
- Pentest Tools List
- Hacker Tools List
- Hacker Tools Apk Download
- Hacking Tools For Pc
- Hacker Tools
- Pentest Tools For Windows
- Beginner Hacker Tools
- Pentest Tools Framework
- Pentest Tools Download
- Hack Tools For Windows
- Hacker Tools Apk
- Pentest Tools
- Pentest Tools Url Fuzzer
- Hack Tools Download
- Hacking Tools For Kali Linux
- Hacking Tools For Pc
- Hacking Tools For Pc
- Hacking Tools Online
- Hacker Tools For Pc
- Pentest Tools For Android
- Hack Tools Mac
- Pentest Tools Bluekeep
- What Are Hacking Tools
- Hack Tools Mac
- Hack Tools 2019
- Kik Hack Tools
- Hacking Tools Usb
- Hack Tool Apk
- Hacker Tools For Windows
- Hacking Tools For Games
- Bluetooth Hacking Tools Kali
- Hacker Tools List
- Hacker Tools Mac
- Top Pentest Tools
- Best Pentesting Tools 2018
- New Hack Tools
- Hacker Tools Github
- Hacker Security Tools
- Hacking Tools Usb
- Hacker Tools Mac
- Pentest Tools Apk
No comments:
Post a Comment