New Research Shows Sorry State of Printer Security

Solarquest

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
"Printers are everywhere!," and while a decade ago this would have been a good thing, as we've got more conscious about security, this statement is now a cause for concern.

There have been numerous reports in the past years that have induced a state of dread when it comes to printer security, but none as ominous as recent research published this week by three academics from Germany.

In their analysis of overall printer security, the three looked at different brands of simple and multifunctional printers, such as HP, Brother, Lexmark, Dell, Samsung, Konica, OKI, and Kyocera, which they collected from fellow faculty members.

Researchers created a tool to automate printer security testing
Using a custom-made tool called PRET (Printer Exploitation Toolkit), researchers automated local (USB), network (LAN), or remote (Internet) attacks on printers using both old and new security bugs.

The researcher team used PRET to run exploits that leveraged attack vectors via PostScript and Printer Job Language (PJL), two languages supported by most of today's major printer vendors.

The team showed that an attacker could gain access to a printer's NVRAM (non-volatile memory) and extract content such as sensitive documents, passwords, and others.

Furthermore, bugs found in multifunctional printers exposed more data, such as passwords for local SMB, FTP, LDAP, SMTP, or POP3 servers, with which the "smart" printer was configured to interact.

Other security flaws allowed the attackers to crash printers or cause damage to some of the printer's physical components.

More details in the link above.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top