Security Threat: Beware the Office Multifunction Printer

02.09.2011
Cybercriminals are always looking for easy ways to break into your network, whether at work or at home. In a talk at this summer's conference, security researcher Deral Heiland demonstrated various ways to compromise . These include printers that can scan to a file, scan to email, and fax documents, and the vulnerabilities he found are similar across all vendors.

If you haven't taken the time to access the administration control panel webpage for your and change its default passwords, do so now. Unfortunately, that will only slow down a very persistent criminal.

For example, Heiland demonstrated that if you did change the default Toshiba printer from 123456 to something unique, a criminal can simply add an extra backslash to the URL to gain administrator access to the device. And he said that if you copy the URL from the HP OfficeJet printer login page and then add "page=" to the end when you paste it back in, this will bypass any new passwords that have been added to those printers. This could let a hacker access sensitive documents that have been recently scanned or printed.

On some of the printer administration webpages, basic coding flaws can also expose sensitive information such as passwords. With the HP Officejet multifunction page, Heiland said he was able to right-click the page in Firefox in order to see the plaintext of the password normally hidden by black dots. The same, he said, was true on the Toshiba models he'd tested.

For office printers, internal address books are often used to route faxes and scanned documents to the individual workstations. Heiland found that, in order to access its address book, Cannon requires an attacker to first have a cookie--which, if they are using a Google search to find the administration webpage over the Internet, they would not necessarily have. But if you click to the Home page tab, Heiland said your computer will receive a cookie that allows you to retrieve the plaintext address book from the printer.

Heiland added that Cannon did fix this vulnerability on most of its Image Runner line, but he found two models--IR3580 and IR4080--that still allowed for this particular hack to work.