Printers Vulnerable To Security Threats 173
jcatcw writes "Networked printers are more vulnerable to attack than many organizations realize. Symantec has logged vulnerabilities in five brands of network printers. Printers outside firewalls, for ease of remote printing, may also be open to easy remote code execution. They can be possible launching pads for attacks on the rest of the network. Disabling services that aren't needed and keeping up with patches are first steps to securing them." From the article: "Security experts say that printers are loaded with more complex applications than ever, running every vulnerable service imaginable, with little or no risk management or oversight.... [N]etworked printers need to be treated like servers or workstations for security purposes — not like dumb peripherals."
Try it out (Score:5, Interesting)
Re:Try it out (Score:5, Insightful)
Re:Try it out (Score:4, Interesting)
Well, at least RMS is happy! (Score:3, Funny)
Re: (Score:2)
Knowing that they are now Linux is a good bit of information.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Not in the JetDirect modules for HP units... (Score:2)
Re: (Score:1)
Re: (Score:3, Interesting)
Re:Try it out (Score:5, Funny)
I always change it to "OUT OF WATER".
I did this to every printer in my high school a few years ago, and it was great. People were speculating as to where the water should go; HP support had no idea what was wrong; etc. After that, some firewall rules were changed and it never happened again
Re: (Score:2)
I really don't get this-- why? Why would you put your printer outside your firewall? So you can print from the internet? What's the point?
Re:Try it out (Score:4, Insightful)
I really don't get this-- why? Why would you put your printer outside your firewall? So you can print from the internet? What's the point?
Re: (Score:2)
I know it sounds strange to us, but it does happen.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I really don't get this-- why? Why would you put your printer outside your firewall? So you can print from the internet? What's the point?
Security is the point. A printer is a firmware-driven device. I only have a limited degree of control over its security. I cannot upgrade the software if there is a bug. I'm basically at the mercy of the manufacturer. Why would I want to place such a questionable device inside my firewall? I want to PROTECT my network from it, not stick the fox in the hen house.
Re: (Score:2)
That might explain why you might want to place it behind some sort of firewall, but not why you'd want to put it live on the internet. Anyway, the security risk of a printer placed on an otherwise secure network doesn't sound sufficiently scary. If someone has access to your printer over the network, then they already have network access, which means they could put a device of their own design on the network. What additional risk is really posed by a printer?
Is it worth it? (Score:2)
Now they have minds of their own. *Grumble* visions of departmental HP printers that never seemed to be configured properly, always displaying bizarre diagnostic messages
Even a $150 Brother all-in-one machine at the office is
Re: (Score:2)
I think your average SOHO and consumer-grade printer isn't too smart. But enterprise-class MFPs are smart because:
* Having a RTOS onboard means the MFP maker can use common development and debugging tools instead of spending time writing their own
* It's easier and cheaper for the MFP maker to hire firmware developers for an RTOS platform than EEs who can program PICs
* It's cheaper and easier for the maker to design or even integrate off-the-shelf MIPS or x86 PCBs an
*print incoming* (Score:5, Funny)
At 8 AM today, someone poisons the coffee. Do NOT drink the coffee. More instructions will follow.
Cordially, Future Dwight.
Re: (Score:2)
Arrrrgh! Time travel paradoxes suck.
Re: (Score:2)
Re: (Score:2)
Identifying viruses (Score:3, Informative)
How much is able one of those printers to do? Printers dedicated to big offices have a pretty powerful processor, lots of RAM, hard drive. Taking control of such a printer could be just as useful for a black-hat cracker as taking control of a computer there, with the bonus that printers aren't usual suspects for infections
Re: (Score:2, Interesting)
Re: (Score:2)
Re: (Score:3, Informative)
But no; I have seen a printer chuck out pages of junk, starting with "This program requires Microsoft Windows" or something, and it was due to an infected Windows machine trying to copy the virus to every SMB share it could see. Including the printer (which was on a SAMBA share).
Re: (Score:2)
In my experience, that virus - printing page after page of funny characters - is a human one, from someone trying to print a PCL formatted file to a PostScript printer or vice versa.
A pure PostScript printer will fail to print anything if given raw PCL. If the PCL is prepended with a PJL job description header and the printer comprehends PJL, it will simply stop with an "Unsupported language" error. Most printers which support both PCL and PostScript will assume PCL as the language if no PJL UEL sequenc
Re: (Score:2)
In my experience, most postscript printers will also print raw text (at least if you send it via LPR). If it detects headers that indicate the content encoding (and if it understands those headers), it will interpret the content as you describe. However, if it gets something at the start that could plausibly be interpreted as plain ASCII text, it will just shove the data straight out to the printer. Thus, it would not be at all surprising for a raw binary format to be printed as garbage unless the printe
Re: (Score:2)
In my experience, most postscript printers will also print raw text (at least if you send it via LPR). If it detects headers that indicate the content encoding (and if it understands those headers), it will interpret the content as you describe.
This works because many PostScript printers are also PCL printers. Raw text is valid PCL, and the printer default language is usually PCL (although you can set it on the front panel in most cases), so it prints.
Like I said, many UNIX lpr spoolers will try to in
What are they going to do... (Score:4, Funny)
Re: (Score:3, Interesting)
Altering what is printed? Change amounts on printed spreadsheets, change destination for item transfers, and other "creative uses"
Re: (Score:2)
One of the first attacks done by security consultants is the printer. From there you can get into the network.
The fact that people here don't seem to relize this is just disconscerting.
Re: (Score:2)
I would say that it won't happen again, but I'm sure it will.
Re: (Score:2)
Print an extra check that the envelope stuffer blindly puts in an envelope?
Or anything else you can do with an exploited computer inside a network.
Most printers have pretty decent CPU in them (how do they do 20ppm?) with good network connectivity. Imagine what a compromised linksys router can do. Now add more CPU, more RAM and better I/O.
Heck, going back to '93 with the Apple LaserWriter. It probably had a faster CPU and more RAM then the Macs it was serving.
They're al
Re: (Score:2)
The possibilities seem infinite
Re: (Score:1)
Oh wait, they don't need that. They even send CDs home!
Well, if they can jam the printers and print stock values... that might be as well annoying.
Double duh (Score:2, Informative)
Happened before (Score:2, Interesting)
Maybe we'll see a lot of these coming, it'll be fun *hee hee hee* {devilish laugh}. I don't have a printer }:-]
Jamming (Score:5, Funny)
This is news? (Score:5, Funny)
Re: (Score:2, Interesting)
I started dicking around with the PCL "ready" message, and they realized that it COULD store data -- in the "ready" message.
New printer, ahoy!
Re: (Score:2)
Yeah - watch out (Score:4, Funny)
Protect your printers today!
I wonder when Symantec will release their first security software suite for printers...
Re: (Score:1)
But a 1337 filter for legitimate printing jobs would be brilliant. Imagine some poor technician trying to diagnose that...
Symantec anti-virus for printers. (Score:3, Funny)
In the long run, it will be easier and more cost effective.
Re: (Score:1)
Campus Printers (Score:4, Interesting)
http://www.vistahelpforum.com/ [vistahelpforum.com]
Re: (Score:2)
Yeah, I've seen that done before - It entirely depends on students printing via locked-down (usually Windows) print servers.
Just note the printer model, download the driver, and install the printer directly on your laptop. Bam, free and unlimited printing.
Re: (Score:3, Informative)
The people at some schools are not idiots and can prevent you from doing this. Some printers actually have access controls, although people seldom bother to use them. Set an admin password, and disallow network printing from any but the print server
Re: (Score:2)
Fortunately, the admins were nice enough to leave it setup so that it respected the lp -o raw command. Produce a postscript file of your printout and send it straight there, comes out exactly as you intended.
Re: (Score:2)
Since this is only an IP-based security solution it can be overcome, but it's not as trivial as plugging your computer into the network and installing the print drivers, at least not if the network is reasonably secured in the first
Re:Campus Printers (Score:5, Insightful)
Re: (Score:2)
This is what happened to Iraq. (Score:3, Interesting)
(The story was recounted in The Generals' War.)
Re: (Score:2, Informative)
Using printers to deal with rowdy girls (Score:5, Funny)
Re: (Score:2, Funny)
"Penthouse For Nerds"? (Score:2)
Nerds are considered the primary audience. Penthouse IS for nerds, in a very direct way.
Somebody who actually gets laid on occasion is more likely to read Playboy (and the articles, for real).
Isn't anything on the network a vulnerability? (Score:4, Insightful)
Is this the cure? (Score:1, Troll)
How FUDtastic!!! (Score:2, Interesting)
Re: (Score:2)
programs a printer to "do something nasty".
And the send the page as a "postcard", with "printit instruction" (for instance the visible part could be instructions on how to do an origami marylin monroe, or a cute valentin themed cupid/aeroplane) anything sufficiently "cute" would be printed by somebody eventually.
At wich time a whole class o
We JUST did it (Score:2)
Regardless, they gave us a network Printer/Fax/Copier. Guess what? It had one of the public IP addresses! I guess it was easier whe
Re: (Score:2)
Symantec is really grasping at straws here. In the age of internet security, why anyone would put a printer outside the firewall is too far beyond me to comprehend.
It is? Weird. To me, a printer is a device I cannot trust. I don't have the source code to the software, I have only limited control over what it does. Why should I put an untrusted device like that INSIDE my firewall? Are you absolutely insane?
Toner and Ink Cartridge companies look to exploit. (Score:2, Interesting)
Imagine those companies that sell expensive toner and ink cartridges pairing up with someone to write some malicious code to burn through your printing supplies faster.
It won't be long before you hear about something like the "Page_Blackout" or "Toner_Drain" worm.
Re:Toner and Ink Cartridge companies look to explo (Score:1)
I can see the 0-day exploit headline now (Score:5, Funny)
Re: (Score:2)
Funny to realise that in 2006 (Score:2)
If you are in the security industry (Score:2)
Fax Machine? (Score:1)
firewall (Score:3, Insightful)
Unlike, of course, printers behind firewalls, which are not at all open to remote code execution, since there's no chance that anything attached to the firewalled network will ever be hacked. Ah, the magic of the firewall.
Two areas of concern here (Score:4, Informative)
Re: (Score:2)
Hacking printers is easy (Score:1)
Re: (Score:2)
I hope people aren't still doing this today. Most modern devices come with some form of secure printing. It may be a password protected "mailbox", or a one time pin for a document, but the feature is there. If used correctly, you could print your job, it would be stored on the hard drive, and stay until the drive died, or a service tech had to wipe the jobs. If the device stores jobs in RAM, it would be available until the power was cycled.
Of course, your print job is only as secure as your passcode. The h
Yeah, it's a security hole... (Score:1)
Happy fragging,
-BA
Terrorist can use this! (Score:1)
Hacking Embedded Network Systems (Score:4, Interesting)
FX of Phenoelit gave an amazing talk on this at CanSecWest/core03 back in 2003 that outlined how to turn a JetDirect printer into a webserver, fileserver or even a port scanner! We all had a huge chuckle at the thought of someone tracking down a port scanner on the network only to find it was coming from an HP printer.
The entire presentation is still available online in both PDF [cansecwest.com] and PPT [cansecwest.com] format.
The tools used to hack the printers are available here [phenoelit.de].
Not just network vulnerability (Score:2)
Nowadays, many copiers don't use traditional xerography [wikipedia.org], but are just fast scanners with printers attached. The network copier/printer down the hall can be used as a document scanner, and even spits out PDFs with searchable text. I don't think it
HP Isn't the only brand (Score:5, Informative)
I work in the networked printer/multifunction industry. While HP is popular on desktops, other brands are gaining, and rule in the 50ppm+ arena. These devices come from other vendors like Canon, Sharp, Kyocera and Xerox. These multifunction devices provide scan, fax and print services and run a variety of OS's from VxWorks to Solaris. Yes Johnny, that means Windows XP embedded as well. Although I have to say, I haven't seen a DOS based controller in about 6 years.
We routinely receive questions about security, and help patch and configure these boxes to meet network security requirements as closely as possible. Unfortunately, we have limited access to the core OS, so we go as far as we can and workaround the rest. Many vendors, especially those using Windows, provide controller patches with security fixes included. EFI [efi.com] even allows an admin to RDP in and use Windows Update to keep current
These devices aren't perfect, but they have come a long way. That being said, if you haven't heard about this in the past, you have no business being in charge of network security. Multifunction devices today are just as powerful as your desktops and servers, running the same software. Admin control is limited, and vulnerabilities are a reality - note the recent Xerox vulnerability [xerox.com]
I would say it is important to stay in contact with your local vendor/dealer to stay on top of these issues. We work with these products everyday, and receive regular notices about security issues and solutions, not to mention a wide variety of other product data. We are a resource, just like any other outside consultant, to help you get and stay secure.
Paper that I co-authored years ago on this topic. (Score:2)
http://csrc.nist.gov/nissc/2000/proceedings/paper
Penetration Analysis of a XEROX Docucenter DC 230ST:. Assessing the Security of a Multi-purpose Office Machine.
Basically, there were many physical and network vulnerabilities that were of concern without even getting to a remote code execution problem.
Enjoy!
More potential abuses... (Score:2)
This could go far beyond simple security threats. Most of us have probably seen all the fax spam clogging up paper trays in offices everywhere. Imagine what the spammers could do with a vulnerability like this.
All of the sudden all of your documents are printing out with a new footer on every page. It'd be fscking priceless when the Human Resources girl prints out and distributes to everyone their updated copies of the company's sexual harrassment policy containing an ad asking me if I wanted to enlar
Pen-test Paper (Score:2)
A lot bigger problems than just printing stuff (Score:2)
Just one more reason (Score:2)
Yup... (Score:2)
even if linux is the embedded os (Score:2)
i worked as a tester for the embedded OS group at a printer maker and you can do almost anything if you know what ports to connect to, etc. pretty fun stuff. they have a funnly functional shell, piping, redirects, and everything.
jason
Re:Unless... (Score:5, Interesting)
The high-end HPs had both harddisk, and a JVM with listening socket on port 80. WHeee!
Re: (Score:2, Insightful)
Re: (Score:2)
Existance of this thing on a Corp Desktop is a SOX violation, waiting(?) to happen.
Re:Unless... (Score:5, Interesting)
Of course, this also means that I can't stick up a website for the world from my laptop anymore, either. =/ Ah well.
Re: (Score:2)
If you put ANY device outside a firewall, you deserve to get hacked. It is very simple to secure the device and still allow remote printing - no excuses.
Yeah, exactly! Put your printer INSIDE the firewall so that when it gets hacked by one of those "safe" print jobs it'll already be inside the iron curtain with full access to your DMZ! Great!
How about we put the printer on the INSECURE side because it is an INSECURE device, eh?
Re: (Score:2)
Re: (Score:2)
Obviously, this isn't your $50 inkjet printer.
Make/model (Score:2)
Obviously, these are the honking corporate printers, not your desktop inkjet.