April 2017 Digital Edition
March 2017 Digital Edition
Feb. 2017 Digital Edition
January 2017 Digital Edition
Nov/Dec 2016 Digital Edition
Oct 2016 Digital Edition
Printers could offer hackers a way in, warns computer readiness team
Some printer models are vulnerable to hackers because of a code flaw, warned the U.S. computer security emergency response team.
In a vulnerability note issued on Nov. 26 and updated on Nov. 29, the U.S. Computer Emergency Readiness Team (CERT) said Samsung printers and some printer made for Dell by Samsung could be vulnerable.
CERT said Samsung printers contain a hardcoded Simple Network Management Protocol (SNMP) code that could allow a remote attacker to take control of an affected device. Specifically, it said the printers contain a hardcoded SNMP full read-write community string that remains active even when SNMP is disabled in the printer management utility.
Using the flaw, it said remote, unauthenticated attackers could access an affected device with administrative read/write privileges. They might also be able to make changes to the device configuration, access to sensitive information like device and network information, credentials, and information passed to the printer, and possibility use the ability to leverage further attacks through arbitrary code execution.
According to CERT, both Samsung and Dell have said that models released after October 31, 2012 are not affected by the vulnerability. The companies have also indicated that they will be releasing a patch tool later this year to address vulnerable devices.
CERT recommended disabling ports on the printer could help mitigate the risks, as well as restricting access to them, as well as disabling SNMP protocol, but noted that solution might be have some drawbacks. “Note that the vulnerability reporter has stated that the community string that remains active even when SNMP is disabled in the printer management utility,” said the CERT.
“As a general good security practice, only allow connections from trusted hosts and networks,” it said. “Restricting access would prevent an attacker from accessing an SNMP interface using the affected credentials from a blocked network location. (e.g. Using IP filtering and Mac address filtering)
Samsung issued a statement acknowledging the flaw and said a patch would be available on Nov. 30 and wasn’t aware of it having been exploited. "Samsung is aware of and has resolved the security issue affecting Samsung network printers and multifunction devices. The issue affects devices only when SNMP is enabled, and is resolved by disabling SNMP," said the company’s statement.
According to Samsung, an update for other models will be available by the end of the year. "However, for customers that are concerned, we encourage them to disable SNMPv1.2 or use the secure SNMPv3 mode until the firmware updates are made."