Friday, August 28, 2020

New Printers Vulnerable To Old Languages

When we published our research on network printer security at the beginning of the year, one major point of criticism was that the tested printers models had been quite old. This is a legitimate argument. Most of the evaluated devices had been in use at our university for years and one may raise the question if new printers share the same weaknesses.

35 year old bugs features

The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:
  • Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
  • Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
  • List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
  • Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
  • Launch denial of Service attacks of various kinds:

Now exploitable from the web

All attacks can be carried out by anyone who can print, which includes:
Note that the product was tested in the default configuration. To be fair, one has to say that the HP PageWide Color Flow MFP 586 allows strong, Kerberos based user authentication. The permission to print, and therefore to attack the device, can be be limited to certain employees, if configured correctly. The attacks can be easily reproduced using our PRET software. We informed HP's Software Security Response Team (SSRT) in February.

Conclusion: Christian Slater is right

PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…

More articles

  1. Hack Tools For Mac
  2. Hacking Tools For Windows 7
  3. Hacking Tools Usb
  4. Hacker Tools Software
  5. Pentest Tools Windows
  6. Hacking Tools Hardware
  7. Pentest Tools Apk
  8. Pentest Recon Tools
  9. Hacker Search Tools
  10. Hacker Techniques Tools And Incident Handling
  11. Wifi Hacker Tools For Windows
  12. Pentest Tools Github
  13. Pentest Tools Framework
  14. Hacking Tools Free Download
  15. Hack Tools
  16. Wifi Hacker Tools For Windows
  17. Hacker Search Tools
  18. Hacker Tools Windows
  19. Hack Website Online Tool
  20. Hacking Tools Mac
  21. What Are Hacking Tools
  22. Hacking Tools For Mac
  23. Hack Apps
  24. Hacker Tool Kit
  25. Hacking Tools For Mac
  26. Hacks And Tools
  27. Best Hacking Tools 2020
  28. Hack Tools
  29. Pentest Automation Tools
  30. Hacking Tools For Windows
  31. Free Pentest Tools For Windows
  32. Hack Tools
  33. What Is Hacking Tools
  34. Hacking Tools Github
  35. Pentest Tools Free
  36. Bluetooth Hacking Tools Kali
  37. Nsa Hacker Tools
  38. Hacker Tool Kit
  39. Hack Tools
  40. Hack Tools For Windows
  41. Best Hacking Tools 2020
  42. Hacking Tools For Windows 7
  43. New Hack Tools
  44. Pentest Tools Tcp Port Scanner
  45. Hack Tools 2019
  46. Hacker Tools Free Download
  47. Hack And Tools
  48. Top Pentest Tools
  49. Hacker Tools For Ios
  50. Hacking Tools For Windows
  51. Hacker Tools 2019
  52. Pentest Tools Tcp Port Scanner
  53. Hack Tools
  54. Nsa Hacker Tools
  55. Install Pentest Tools Ubuntu
  56. Pentest Recon Tools
  57. Beginner Hacker Tools
  58. Hacking Tools Github
  59. Pentest Recon Tools
  60. Pentest Tools Bluekeep
  61. Physical Pentest Tools
  62. Hack Tools Online
  63. Hacking Tools Usb
  64. Hacking Tools Github
  65. Hacking Tools Hardware
  66. Hak5 Tools
  67. Pentest Tools Download
  68. Hacking Tools Mac
  69. Hacker Tools Free
  70. Pentest Tools Apk
  71. Hacking Tools Hardware
  72. Pentest Tools Kali Linux
  73. Hack Tool Apk No Root
  74. Hacking Tools Windows 10
  75. Easy Hack Tools
  76. Hack Tools Mac
  77. Hacker Tools List
  78. Pentest Tools Website Vulnerability
  79. Hack Tools Github
  80. Hacking Tools Online
  81. What Are Hacking Tools
  82. Kik Hack Tools
  83. Pentest Tools Framework
  84. Pentest Tools
  85. Hacking Tools For Beginners
  86. Kik Hack Tools
  87. New Hack Tools
  88. Pentest Tools Find Subdomains
  89. Hak5 Tools
  90. Hacking Tools Online
  91. Hacks And Tools
  92. Blackhat Hacker Tools
  93. What Are Hacking Tools
  94. Hacker Tools For Windows
  95. New Hacker Tools
  96. Hack Tools For Ubuntu
  97. Hacker Tools Hardware
  98. Computer Hacker
  99. Pentest Tools Github
  100. Hack Tools Github
  101. Blackhat Hacker Tools
  102. Hack Tools For Mac
  103. Hacking Tools Windows
  104. What Is Hacking Tools
  105. Hack Tools For Mac
  106. Nsa Hack Tools Download
  107. Hacking Tools Mac
  108. Hacker Search Tools
  109. Hacker Tools Software
  110. Pentest Tools Open Source
  111. Physical Pentest Tools
  112. Hacking Tools Online
  113. Pentest Recon Tools
  114. Hack Tools
  115. Pentest Tools Port Scanner
  116. Pentest Automation Tools
  117. Nsa Hacker Tools
  118. New Hack Tools

No comments:

Post a Comment