HP LaserJet printers vulnerable to attacks, researchers warn
Company downplays danger threat, says fix is coming
Computerworld - Millions of Hewlett Packard Co.'s LaserJet printers contain a security weakness that could allow attackers to take control of the systems, steal data from them and issue commands that could cause the devices to overheat and catch fire, according to two researchers from Columbia University.
Printers from other vendors likely have the same issue, leaving users of those devices exposed to similar threats, the researchers said.
The security researchers findings was first published by MSNBC.com earlier today.
In response, HP today downplayed the researchers' claims, labeling them "sensational and inaccurate."
"While HP has identified a potential security vulnerability with some HP LaserJet printers, no customer has reported unauthorized access," the company said.
It disputed media reports that the flaw would let hackers set LaserJet printers on fire and said that safety mechanisms built into the printers precluded that from happening.
The flaw in HP's LaserJet printers was discovered by Professor Salvatore Stolfo of the Computer Science Department at Columbia University's School of Engineering and Applied Science and fellow security researcher Ang Cui.
The vulnerability exists in the LaserJet printer's Remote Firmware Update process. Because of weak authentication measures, the printers can be fooled into accepting arbitrarily modified firmware by anyone with logical access to the device, Stolfo said in an interview.
The LaserJet printers that were tested do not require firmware updates to be digitally signed, allowing anyone to essentially instruct the printer to erase its existing operating software and overwrite it with a malicious one.
Attackers could gain total control of the printer and rewrite its software so that it would be impossible to reset it, he said. "It is a pretty bad security flaw," Stolfo said.
Stolfo said that he and Cui investigated three popular LaserJet models and discovered the same weakness in all three. The printers were the LaserJet 203x/205x, the LaserJet 3800 series and the LaserJet 4005.
All that was required to compromise the printers was a maliciously crafted print job, either sent by someone with access to the printer or by someone remotely if the printer is connected directly to the Internet, according to Stolfo.
The flaw allows attackers to steal documents from a compromised printer, or to use the device as a launch pad for attacking computers attached to it. The vulnerability also allows attackers to issue a command that could cause the printer's fuser, which is used to dry ink, to start heating up. Theoretically at least, that could cause the printing paper to catch fire.
According to Stolfo, during a demonstration, he was able to get the fuser on a LaserJet printer hot enough to cause the printer paper to brown and start smoking. But a safety mechanism built into the printer caused it to fail in a safe manner before it could catch on fire.
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- PCI 3.0 Compliance In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint devices.
- Mitigating Security Risks at the Networks Edge This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
- 5 Strategies for Modern Data Protection Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that...
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!