Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Printer

+ - Hardcoded Administrator Account Opens Backdoor Access to Samsung Printers->

Submitted by hypnosec
hypnosec (2231454) writes "A new flaw has been discovered in printers manufactured by Samsung whereby a backdoor in the form of an administrator account would enable attackers to not only take control of the flawed device but, will also allow them to attack other systems in the network. According to a warning on US-CERT the administrator account is hard-coded in the device in the form of a SNMP community string with full read-write access. The backdoor is not only present in Samsung printers but also in Dell printers that have been manufacture by Samsung. The administrator account remains active even if SNMP is disabled from the printer's administration interface."
Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Hardcoded Administrator Account Opens Backdoor Access to Samsung Printers

Comments Filter:

APL is a write-only language. I can write programs in APL, but I can't read any of them. -- Roy Keir

Working...