Security vulnerabilities on Multi-Function printers Sep 05, 2011 14:11 by John Sollars
Cybercriminals are always looking for easy ways to break into your network, whether at work or at home. In a talk at this summer’s DefCon19 conference, security researcher Deral Heilanddemonstrated various ways to compromise multifunction printers. These include printers that can scan to a file, scan to email, and fax documents, and the vulnerabilities he found are similar across all vendors.His research found that he was able to harvest information from multifunction printers (MFP) that can be leveraged to gain access to other core network systems. By taking advantage of poor printer security and vulnerabilities during penetration testing he was able to harvest a wealth of information from MFP devices including usernames, email addresses, and authentication information including SMB, Email, LDAP passwords. Leveraging this information he has successfully gained administrative access into core systems including email servers, file servers and Active directory domains on multiple occasionsIf you haven’t taken the time to access the administration control panel webpage for your printer and change its default passwords, do so now. Unfortunately, that will only slow down a very persistent criminal.For example, Heiland demonstrated that if you did change the default Toshiba printer password from 123456 to something unique, a criminal can simply add an extra backslash to the URL to gain administrator access to the device. And he said that if you copy the URL from the HP OfficeJet printer login page and then add “page=” to the end when you paste it back in, this will bypass any new passwords that have been added to those printers. This could let a hacker access sensitive documents that have been recently scanned or printed.
On some of the printer administration webpages, basic coding flaws can also expose sensitive information such as passwords. With the HP Officejet multifunction page, Heiland said he was able to right-click the page in Firefox in order to see the plaintext of the password normally hidden by black dots. The same, he said, was true on the Toshiba models he’d tested.
For office printers, internal address books are often used to route faxes and scanned documents to the individual workstations. Heiland found that, in order to access its address book, Cannon requires an attacker to first have a cookie–which, if they are using a Google search to find the administration webpage over the Internet, they would not necessarily have. But if you click to the Home page tab, Heiland said your computer will receive a cookie that allows you to retrieve the plaintext address book from the printer. He added that Cannon did fix this vulnerability on most of its Image Runner line, but he found two models–IR3580 and IR4080–that still allowed for this particular hack to work.
Another attack takes advantage of the backup feature (or “cloning”, as Xerox calls it) on the printer. In the case of Lexmark and Xerox printers, he said the backups exported the account passwords in plain text.
In yet another attack. he was able to redirect the test pages that most printers spit out by intercepting the Lightweight Directory Access Protocol (LDAP) in a sort of man-in-the-middle attack. Here he attacked Sharp and Ricoh printers, redirecting their test pages to him, and setting him up as a valid user.