Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Printer Security Hardware

Hardcoded Administrator Account Opens Backdoor Access To Samsung Printers 103

hypnosec writes "A new flaw has been discovered in printers manufactured by Samsung whereby a backdoor in the form of an administrator account would enable attackers to not only take control of the flawed device, but will also allow them to attack other systems in the network. According to a warning on US-CERT the administrator account is hard-coded in the device in the form of an SNMP community string with full read-write access. The backdoor is not only present in Samsung printers but also in Dell printers that have been manufactured by Samsung. The administrator account remains active even if SNMP is disabled from the printer's administration interface."
This discussion has been archived. No new comments can be posted.

Hardcoded Administrator Account Opens Backdoor Access To Samsung Printers

Comments Filter:
  • by Tanktalus ( 794810 ) on Tuesday November 27, 2012 @06:50PM (#42110499) Journal

    Yes. Because we don't want any way to prevent student A from cancelling student B's jobs. Or any way for a trusted user, such as the sysadmin, from cancelling all jobs.

    And we definitely want all nimwits on the network to have complete and arbitrary control over how many pages they can use, or how much ink. Maximum quality print jobs in a comp sci department printer? No problem! (I remember watching a dot-matrix printer spit out a core file, that was entertaining.)

    Definitely, no good whatsoever could come from a printer with any authentication control.

    Obviously, Samsung agrees, because all their printers apparently have the same unchangeable admin account and password.

  • by mlts ( 1038732 ) * on Tuesday November 27, 2012 @07:12PM (#42110701)

    Someone needs to invent a fairly simple device. It would have two Ethernet ports and a USB port. The USB port is used for programming it, perhaps then used for power. The Ethernet ports would be used for bridging/routing.

    You put the device between whatever device and the rest of the network, select what purpose the device does, (or manually specify ports), and call it done, with the thing automatically proxying/masquerading. Print job hits port 515 on the device, the device sends the packets to the printer.

    This way, even if there is some unknown port, it gets shut off.

    Of course, the next step for backdoors would be backdoors in protocols (such as unique packets that normally would get ignored), but that can be found by DPI.

  • by iamhassi ( 659463 ) on Tuesday November 27, 2012 @07:36PM (#42110955) Journal

    What about the Samsung backdoor into your phones?

    That's the first thing I thought too, that if we just discovered this in Samsung printers is there a hardcoded backdoor in Samsung galaxy s3 phones too?

  • by evilviper ( 135110 ) on Tuesday November 27, 2012 @07:38PM (#42110973) Journal

    A printer should be a computer that only receives files and prints them. They should not be "connected" to a network any more than a UDP package is connected to its recipient.

    Oh good, because we wouldn't want to have any assurances that our 100MB print jobs were transferred to the printer successfully... Or know when they're running low on toner... or that there's a paper jam and the printer has caught fire... or be able to tell it to use the media in tray number 5... or be able to connect a printer to your WiFi network.

8 Catfish = 1 Octo-puss

Working...