HP LaserJet printers vulnerable to attacks, researchers warn
It is unclear whether the same sort of safety mechanism exists on printers from other vendors, he added.
Stolfo said that Cui and he discovered the LaserJet vulnerability when doing research on vulnerabilities in single-purpose embedded devices such as printers, routers, VoIP phones and digital thermostats. The two researchers plan to release a formal paper describing their findings after HP has had a chance to mitigate the issue, he said.
HP did not immediately respond to a request for comment. In its statement, HP said it is working on a firmware update for the issue. However, it downplayed the threat.
"The specific vulnerability exists for some HP LaserJet devices if placed on a public internet without a firewall," the company said. "In a private network, some printers may be vulnerable if a malicious effort is made to modify the firmware of the device by a trusted party on the network."
LaserJet printers in some Linux or Mac environments could be compromised by someone sending the device a corrupt print job, the company said.
"Speculation regarding potential for devices to catch fire due to a firmware change is false," HP noted. A hardware element known as a thermal breaker prevents LaserJet printers from overheating or causing a fire. "It cannot be overcome by a firmware change or this proposed vulnerability," HP said.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Security in Computerworld's Security Topic Center.
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Ponemon 2014 SSH Security Vulnerability Report According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!