Last Updated: 2011-12-23 Version: 2 (rev.2) 23 December
2011 Code signing firmware available
___HP LaserJet printers - firmware access vuln
CVE Reference: CVE-2011-4161
Updated: Dec 1 2011
Impact: Execution of arbitrary code via network, Root access via network
Vendor Confirmed: Yes
Description: A vulnerability was reported in some HP LaserJet Printers. A remote user can update the firmware with arbitrary code. A remote user can send a specially crafted print job or specially crafted data to TCP port 9100 on the target printer to trigger an unspecified flaw and cause the printer to upgrade its firmware with arbitrary code. Some printers do not check digital signatures on firmware upgrades...
The original advisory is available at:http://redtape.msnbc...researchers-say
Impact: A remote user can upgrade the printer's firmware with arbitrary code.
Solution: ... The vendor recommends disabling the 'Printer Firmware Update' feature as described at:http://h71028.www7.h...P-Imaging10.pdf
The vendor's advisory is available at:http://h20565.www2.h...mr_na-c03102449
Last Updated: 2011-11-30
Last revised: 12/02/2011
CVSS v2 Base Score: 10.0 (HIGH)
Release Date: 2011-12-01
Criticality level: Moderately critical
Impact: Security Bypass ...
Last Updated: 2011-11-29 16:22:00 UTC
30 November 2011
Nov. 29, 2011 - "... Today there has been sensational and inaccurate reporting regarding a potential security vulnerability with some HP LaserJet printers. No customer has reported unauthorized access
. Speculation regarding potential for devices to catch fire due to a firmware change is false. HP LaserJet printers have a hardware element called a “thermal breaker” that is designed to prevent the fuser from overheating or causing a fire. It cannot be overcome by a firmware change or this proposed vulnerability. While HP has identified a potential security vulnerability with some HP LaserJet printers, no customer has reported unauthorized access. The specific vulnerability exists for some HP LaserJet devices if placed on a public internet without a firewall
. In a private network, some printers may be vulnerable if a malicious effort is made to modify the firmware of the device by a trusted party on the network. In some Linux or Mac environments, it may be possible for a specially formatted corrupt print job to trigger a firmware upgrade.HP is building a firmware upgrade to mitigate this issue
and will be communicating this proactively to customers and partners who may be impacted. In the meantime, HP reiterates its recommendation to follow best practices for securing devices by placing printers behind a firewall and, where possible, disabling remote firmware upload on exposed printers..."
Edited by AplusWebMaster, 02 January 2012 - 08:45 AM.