Are Pass-Back Attacks on Xerox Printers a Threat to Your Network?

Article Highlights
Off On

In the rapidly evolving landscape of cybersecurity, a newly identified vulnerability in Xerox VersaLink C7025 multifunction printers (MFPs) has raised significant concerns. These vulnerabilities, found in firmware version 57.69.91 and earlier, can allow attackers to capture user credentials through a method known as pass-back attacks. This article delves into the implications of these vulnerabilities for organizational security, particularly in Windows environments.

Understanding the Vulnerabilities

How Pass-Back Attacks Work

Pass-back attacks involve manipulating a device’s configuration to reroute legitimate credential checks to an attacker-controlled system. This method allows attackers to capture login details, posing a severe risk to organizational security. The principal researcher from Rapid7, Deral Heiland, highlights the potential for attackers to gain access to Windows Active Directory credentials through these vulnerabilities. These attacks can enable lateral movement within the network, potentially compromising other critical systems.

The vulnerabilities in Xerox VersaLink C7025 printers enable attackers to set a malicious IP address for user authentication servers, effectively rerouting credential checks to their systems. This method allows the capture of authentication details in plain text, providing a simple yet effective means to infiltrate networks. It’s worth noting that once attackers gain these credentials, they could potentially access sensitive data, disrupt operations, or further propagate their reach within the network, leading to widespread consequences.

Specific Vulnerabilities in Xerox VersaLink C7025

The identified vulnerabilities, CVE-2024-12510 and CVE-2024-12511, affect the LDAP and SMB/FTP configurations of the Xerox VersaLink C7025 printers. These vulnerabilities allow attackers to alter the printer’s configuration to send user credentials to a malicious server, facilitating credential capture. CVE-2024-12510 is an LDAP pass-back vulnerability with a CVSS score of 6.7, while CVE-2024-12511 is an SMB/FTP pass-back vulnerability with a score of 7.6, presenting a significant threat to network security.

By exploiting CVE-2024-12510, an attacker can access the MFP’s LDAP configuration page and change the server’s IP address to a malicious one. When the printer attempts user authentication, it connects to the fake LDAP server, allowing for the capture of clear text LDAP service credentials. Similarly, CVE-2024-12511 enables attackers to manipulate the IP addresses of SMB or FTP servers. When scanning functions are initiated, these malicious configurations allow the attacker to capture authentication credentials for these services as well, providing a comprehensive set of data for launching further attacks.

Exploitation and Risks

Steps to Exploit the Vulnerabilities

The process of exploiting these vulnerabilities involves several key steps and does not require advanced skills. First, a perpetrator connects to the affected printer via a web browser and checks if the default password is still active, which is not uncommon as many organizations neglect to change default credentials. Next, they ensure that the devices are configured for LDAP and/or SMB services, which can be easily verified through common administrative interfaces or even network scanning tools.

Another technique used by attackers is querying the MFP using SNMP (Simple Network Management Protocol) to check if LDAP services are enabled. Once these services are confirmed, the attacker can proceed to alter the configuration settings, substituting legitimate server addresses with their malicious IPs. By doing so, whenever the printer attempts to authenticate a user, it communicates with the attacker’s system instead of the intended legitimate server, resulting in user credentials being captured without detection.

Potential Impact on Organizational Security

The greatest risk posed by these vulnerabilities lies in the potential for attackers to harvest Windows Active Directory credentials undetected. Once these credentials are obtained, attackers can facilitate lateral movement within the network, thereby expanding their reach to other critical servers and file systems. This capability to penetrate deeper into the network infrastructure and gain access to high-value targets creates a substantial threat to organizational security, putting sensitive data and operations at risk.

It is not uncommon to find Domain Admin credentials stored within LDAP settings on MFP devices, which can result in severe repercussions if compromised. Attackers gaining such high-level access could attain complete control over an organization’s Windows environment, enabling them to execute comprehensive and damaging actions across the network. Jim Routh, chief trust officer at Saviynt, emphasized that while the attack technique requires a certain level of sophistication, the stakes are alarmingly high due to the potential access to Windows Active Directory, highlighting the critical need for robust security measures.

Mitigation and Prevention

Xerox’s Response and Firmware Update

In response to the discovery of these vulnerabilities, Xerox has taken prompt action by releasing an updated firmware version to address and patch the security gaps. This update aims to secure the troubled configurations and prevent unauthorized alterations of authentication server IPs. Organizations utilizing the VersaLink C7025 printers are strongly advised to update their firmware as a priority measure to mitigate the inherent risks associated with these vulnerabilities.

Updating the firmware will ensure that the printers are no longer susceptible to the identified pass-back attack methods. However, it is recognized that some organizations may face challenges in implementing immediate updates. For these entities, incorporating additional layered security measures could be an instrumental step towards closing the exposure gap. It is imperative that organizations assess the urgency of the firmware update within the context of their own security posture and response capabilities.

Additional Security Recommendations

Beyond the immediate firmware update, Rapid7 advocates for the adoption of several best practices to enhance overall security and reduce the risk of exploitation. One key recommendation is the use of complex, robust passwords for administrative accounts to thwart unauthorized access attempts. Additionally, leveraging elevated privilege accounts, such as Domain Admin accounts, for LDAP or SMB services should be avoided, as these credentials present highly attractive targets for attackers.

Another critical measure involves disabling remote-control consoles for unauthenticated users, limiting the avenues through which attackers could potentially manipulate device configurations. By implementing these security recommendations, alongside frequent reviews and updates of security configurations, organizations can establish a multi-faceted defense strategy. These proactive steps collectively serve to strengthen an organization’s security posture and provide a buffer against both known and yet-to-be-discovered vulnerabilities.

The Broader Context

Increasing Printer Vulnerabilities

As more organizations pivot towards remote and hybrid work models, the prevalence of printer vulnerabilities has seen a marked increase. A 2024 study conducted by Quocirca highlighted that 67% of organizations reported experiencing security incidents directly linked to printer vulnerabilities, reflecting a rise from 61% the preceding year. This upward trend underscores the growing recognition of printers as potential security weak points within the broader IT infrastructure.

Printers, traditionally viewed as simple office equipment, are now integrated into network environments with access to sensitive documents and authentication mechanisms. Consequently, they have become attractive targets for cybercriminals looking to exploit these overlooked entry points. The increased connectivity of printers with cloud services and mobile devices further complicates the security landscape, requiring organizations to reevaluate their printer security strategies in light of these evolving risks.

The Need for Proactive Measures

In the fast-changing world of cybersecurity, a newly discovered vulnerability in Xerox VersaLink C7025 multifunction printers (MFPs) has sparked serious concern. These vulnerabilities exist in firmware version 57.69.91 and earlier, presenting a risk where attackers can intercept user credentials via a technique known as pass-back attacks. The revelation of this flaw has significant implications for the security of organizations, especially those operating in Windows environments. Pass-back attacks involve capturing and retransmitting data, which can lead to unauthorized access to sensitive information.

This issue underscores the necessity for robust cybersecurity measures and the importance of regularly updating firmware to mitigate risks. Organizations must stay vigilant and proactive in identifying potential vulnerabilities to protect their data and systems from cyber threats. The discovery highlights the importance of continuous monitoring and prompt response to any security anomalies to safeguard against such exploits.

Explore more