Identity, Vulnerability Management, Endpoint/Device Security

Bugs found in five leading printers, one of them a critical 9.8 flaw

printer and Laptop on wood table

A zero-day research project into multifunction printers by Rapid7 found eight new vulnerabilities, one of them a critical 9.8 authentication bypass flaw.

Seven of the bugs were updated in firmware, while a workaround was provided for the critical flaw, according to Rapid7 researchers in a June 25 blog.

Rapid7 worked with IPCERT/CC and Brother Industries to find a total of 748 models affected across five vendors: Brother Industries, Fujifilm Business Innovation, Ricoh, Toshiba Tec Corporation, and Konica Minolta.

Stephen Fewer, principal security researcher at Rapid7, said some devices were configured to automatically update their firmware to the latest available version, while others are configured to manually update.

“Therefore, security teams must review this for every device to ensure that the expected firmware updates have actually been applied,” Fewer said. “Teams should also prioritize the authentication bypass flaw.”

Fewer added that the workaround provided for the authentication bypass – CVE-2024-51978 – should be straightforward for most security teams. They’ll need to manually change the default administrator password on every affected device. Fewer noted that a factory reset of any affected device would revert back to the default administrator password, so teams need to apply the workaround every time a device gets factory reset.

John Gallagher, vice president at Viakoo, added that while repairing a critical printer flaw seems like a normal issue for IT teams, the real issue is the vast number of printers used and managed outside of IT.  Like many IoT devices, Gallagher said the patching and maintenance of printers may not be a priority for the line-of-business units operating them. 

“Yet if these devices remained unpatched, there’s significant risk to the organization overall,” said Gallagher. “Printers are heavily used in certain verticals like healthcare that threat actors target. In healthcare the printer may be for creating patient ID wristbands, instructions to doctors or surgeons, scanning health records, and so forth. Since many printers today store documents in their print buffer or on storage within the device, there’s a threat of patient personal information being stolen.” 

David Matalon, chief executive officer at Venn, said the vulnerabilities uncovered by Rapid7 highlight a much broader issue: When employees work outside the corporate perimeter, the threat surface expands.

“Organizations need to focus on shrinking that threat surface and consider strategies for ensuring their company data is protected independently of the device it's on, or the user’s home network that may be used to access it,” said Matalon. “That includes considering all paths to data including unmanaged printers, smart devices, and anything else connected to a home network that’s outside of IT’s control.”

Here’s a quick guide from Rapid7’s Fewer on how teams can effectively respond to these eight new printer flaws:

  • Assess: Security teams must assess their exposure to these vulnerabilities, first by understanding what printer, scanner, and label maker devices are deployed throughout their environments. By collecting the vendor and model names of their deployed printer, scanner, and label maker devices, security teams can correlate what’s on their network to the known affected models. This can either be a manual effort, or vulnerability management and exposure tools can greatly expedite this.
  • Create a remediation plan: Once these devices have been identified, put a remediation plan into effect to ensure all affected devices are updated to the latest firmware, and the vendor supplied workaround for the authentication bypass is followed. This workaround requires manually changing the default administrator password on all affected devices.
  • Practice defense-in-depth: Security teams should also consider defense-in-depth measures, such as removing printer devices that are exposed across network segments, and enabling automatic firmware updates.
  • An In-Depth Guide to Identity

    Get essential knowledge and practical strategies to fortify your identity security.

    You can skip this ad in 5 seconds