US-CERT: Samsung Printer Firmware Contains BackdoorUS-CERT: Samsung Printer Firmware Contains Backdoor
Samsung printers contain a hard-coded account that could allow a remote attacker to take control
November 29, 2012
Samsung printers manufactured before October of this year contain a backdoor account that could allow hackers to take control of them remotely, a researcher reported to US-CERT this week.
According to a vulnerability report made to US-CERT by researcher Neil Smith, Samsung printers -- as well as some Dell printers manufactured by Samsung -- contain a "hard-coded SNMP full read-write community string that remains active even when SNMP is disabled in the printer management utility."
The Simple Network Management Protocol (SNMP) is used to monitor the status of remote devices.
Using this backdoor account, a remote, unauthenticated attacker could access an affected device with administrative privileges, according to US-CERT. Such access could enable an attacker to make changes to the device configuration, gain access to sensitive information -- such as device and network information, credentials, and information passed to the printer -- and execute further attacks through arbitrary code.
Samsung and Dell have stated that models released after Oct. 31, 2012, are not affected by this vulnerability. Both companies said they will be releasing a patch tool later this year to address vulnerable devices.
Smith suggested that blocking the custom SNMP trap port of 1118/udp will help mitigate the risks posed by the backdoor.
Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report
Build a Case for a Password Manager