Study: Common printers in enterprises are vulnerable to hacking
A new study has found that printers commonly used in enterprise environments are a security risk that can be exploited to leak information and execute code.
The study, Exploiting Printer Security from Ruhr-Universität Bochum researcher Jens Müller, analyzed 20 printers and multi-function printers to find that every single printer tested had at least one exploitable security vulnerability.
Testing of the printers, which included units from HP, Brother, Lexmark, Dell, Samsung, Konica, OKI and Kyocera, found that the vulnerabilities were primarily due to vendors failing to separate page description languages such as PostScript and PJL/PCL that are used to generate the output from printer controls. “Potentially harmful commands can be executed by anyone who has the right to print,” Müller noted in the paper.
The attacks described in the study can be launched through USB, remotely over the local network or from the Internet via a malicious website using cross-site printing and cross-origin resource sharing spoofing. Using PostScript and Printer Job Language commands, an attacker can access entire file systems from some printers, including passwords for the embedded web server.
The HP LaserJet 1200, 4200N and 4250N along with the Dell 3130cn and Samsung Multipress 6345N were also found to have a vulnerable line printer daemon service that cannot handle usernames with 150 or more characters, meaning that sending a long username to the LPD service causes the printer to crash, and with the correct shellcode and return address, the vulnerability could be used for remote code execution.
Müller said that he had advised the vendors of his findings. But given that some of the vulnerabilities have been known for more than a decade, it appears that printer makers aren’t much concerned and haven’t been taking printer security seriously.
Image: 29233640@N07/Flickr/CC by 2.0
Since you’re here …
… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.