Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Samsung Printers Vulnerable to Attack Due to Hardcoded Admin Access

Printers manufactured by Samsung, and sold via Dell or direct channels, are vulnerable to attack thanks to a hard-coded administrator account in the device’s firmware. The company says that devices made after Oct. 31 are not vulnerable, but it will take time before a patch tool is released.

Printers manufactured by Samsung, and sold via Dell or direct channels, are vulnerable to attack thanks to a hard-coded administrator account in the device’s firmware. The company says that devices made after Oct. 31 are not vulnerable, but it will take time before a patch tool is released.

The issue centers on a hardcoded SNMP (Simple Network Management Protocol) community string, which allows full read-write abilities. The string is included with every Samsung printer made before Oct. 31 of this year, according to Samsung. Because the SNMP string remains active, even if it is disabled via the customer through the admin interface, a remote attacker can take control of the device.

“A remote, unauthenticated attacker could access an affected device with administrative privileges. Secondary impacts include: the ability to make changes to the device configuration, access to sensitive information (e.g., device and network information, credentials, and information passed to the printer), and the ability to leverage further attacks through arbitrary code execution,” a CERT warning explains.

A patch is in the works, and as mentioned, Samsung has since stopped using the hard-coded string.

In the meantime, organizations with Dell printers (manufactured by Samsung) that are concerned can restrict access to printers from untrusted hosts and networks, or block port 1118/udp on their network as a short-term mitigation.

Related Reading: HP Printer Firmware Vulnerabilities-  FUD or Fire?

Related Reading: McAfee, Xerox Team Up on Printer Security

Related Reading: 0wning Office Printers

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.