HP LaserJet printers vulnerable to attacks, researchers warn
Company downplays danger threat, says fix is coming
Computerworld - Millions of Hewlett Packard Co.'s LaserJet printers contain a security weakness that could allow attackers to take control of the systems, steal data from them and issue commands that could cause the devices to overheat and catch fire, according to two researchers from Columbia University.
Printers from other vendors likely have the same issue, leaving users of those devices exposed to similar threats, the researchers said.
The security researchers findings was first published by MSNBC.com earlier today.
In response, HP today downplayed the researchers' claims, labeling them "sensational and inaccurate."
"While HP has identified a potential security vulnerability with some HP LaserJet printers, no customer has reported unauthorized access," the company said.
It disputed media reports that the flaw would let hackers set LaserJet printers on fire and said that safety mechanisms built into the printers precluded that from happening.
The flaw in HP's LaserJet printers was discovered by Professor Salvatore Stolfo of the Computer Science Department at Columbia University's School of Engineering and Applied Science and fellow security researcher Ang Cui.
The vulnerability exists in the LaserJet printer's Remote Firmware Update process. Because of weak authentication measures, the printers can be fooled into accepting arbitrarily modified firmware by anyone with logical access to the device, Stolfo said in an interview.
The LaserJet printers that were tested do not require firmware updates to be digitally signed, allowing anyone to essentially instruct the printer to erase its existing operating software and overwrite it with a malicious one.
Attackers could gain total control of the printer and rewrite its software so that it would be impossible to reset it, he said. "It is a pretty bad security flaw," Stolfo said.
Stolfo said that he and Cui investigated three popular LaserJet models and discovered the same weakness in all three. The printers were the LaserJet 203x/205x, the LaserJet 3800 series and the LaserJet 4005.
All that was required to compromise the printers was a maliciously crafted print job, either sent by someone with access to the printer or by someone remotely if the printer is connected directly to the Internet, according to Stolfo.
The flaw allows attackers to steal documents from a compromised printer, or to use the device as a launch pad for attacking computers attached to it. The vulnerability also allows attackers to issue a command that could cause the printer's fuser, which is used to dry ink, to start heating up. Theoretically at least, that could cause the printing paper to catch fire.
According to Stolfo, during a demonstration, he was able to get the fuser on a LaserJet printer hot enough to cause the printer paper to brown and start smoking. But a safety mechanism built into the printer caused it to fail in a safe manner before it could catch on fire.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts