Samsung to issue firmware fix for printer security flaw on Friday
Samsung said disabling older versions of SNMP on the printers would protect them, contradicting an earlier security warning from US-CERT
IDG News Service - Samsung Electronics will close a security hole in the firmware of some of its printers by issuing an update on Friday, and said they could be protected by disabling SNMP.
The affected printers have a backdoor administrator account hard-coded in their firmware that does not require authentication and can be accessed over the Simple Network Management Protocol (SNMP) interface, the U.S. Computer Emergency Readiness Team (US-CERT) said earlier this week in an advisory.
The affected Samsung printers, and some Dell printers made by Samsung, contain a hardcoded SNMP full read-write community string that remains active even when SNMP is disabled in the printer management utility, US-CERT said.
SNMP is an Internet protocol commonly used to monitor and read statistics from network-attached devices.
Attackers could potentially change a printer's configuration, read its network information or stored credentials, and access sensitive information passed to it by users, US-CERT said. It recommended blocking the port used to access SNMP in the network.
However, Samsung played down the danger. The problem only affects the printers when SNMP is enabled, and is resolved by disabling SNMP, Samsung said in a statement on Wednesday.
"For customers that are concerned, we encourage them to disable SNMP v1,2 or use the secure SNMPv3 mode until the firmware updates are made," Samsung said.
It is releasing updated firmware for all current models, with all other models receiving an update by the end of the year. Samsung did not name the models affected.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts