HP LaserJet printers vulnerable to attacks, researchers warn
Company downplays danger threat, says fix is coming
Computerworld - Millions of Hewlett Packard Co.'s LaserJet printers contain a security weakness that could allow attackers to take control of the systems, steal data from them and issue commands that could cause the devices to overheat and catch fire, according to two researchers from Columbia University.
Printers from other vendors likely have the same issue, leaving users of those devices exposed to similar threats, the researchers said.
The security researchers findings was first published by MSNBC.com earlier today.
In response, HP today downplayed the researchers' claims, labeling them "sensational and inaccurate."
"While HP has identified a potential security vulnerability with some HP LaserJet printers, no customer has reported unauthorized access," the company said.
It disputed media reports that the flaw would let hackers set LaserJet printers on fire and said that safety mechanisms built into the printers precluded that from happening.
The flaw in HP's LaserJet printers was discovered by Professor Salvatore Stolfo of the Computer Science Department at Columbia University's School of Engineering and Applied Science and fellow security researcher Ang Cui.
The vulnerability exists in the LaserJet printer's Remote Firmware Update process. Because of weak authentication measures, the printers can be fooled into accepting arbitrarily modified firmware by anyone with logical access to the device, Stolfo said in an interview.
The LaserJet printers that were tested do not require firmware updates to be digitally signed, allowing anyone to essentially instruct the printer to erase its existing operating software and overwrite it with a malicious one.
Attackers could gain total control of the printer and rewrite its software so that it would be impossible to reset it, he said. "It is a pretty bad security flaw," Stolfo said.
Stolfo said that he and Cui investigated three popular LaserJet models and discovered the same weakness in all three. The printers were the LaserJet 203x/205x, the LaserJet 3800 series and the LaserJet 4005.
All that was required to compromise the printers was a maliciously crafted print job, either sent by someone with access to the printer or by someone remotely if the printer is connected directly to the Internet, according to Stolfo.
The flaw allows attackers to steal documents from a compromised printer, or to use the device as a launch pad for attacking computers attached to it. The vulnerability also allows attackers to issue a command that could cause the printer's fuser, which is used to dry ink, to start heating up. Theoretically at least, that could cause the printing paper to catch fire.
According to Stolfo, during a demonstration, he was able to get the fuser on a LaserJet printer hot enough to cause the printer paper to brown and start smoking. But a safety mechanism built into the printer caused it to fail in a safe manner before it could catch on fire.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!