Xerox Versalink Multi-Function Printers Vulnerability Exposed: Active Directory Credentials at Risk

URL: TheHackerNews Post

:
TheHackerNews recently disclosed a critical security vulnerability in Xerox Versalink Multi-Function Printers. This flaw could allow attackers to exploit the printer’s LDAP and SMB/FTP functions to steal Active Directory credentials. Xerox has since released a patch to address this issue.

Practice Verified Codes and Commands:

1. Check for LDAP Vulnerabilities:

ldapsearch -x -h <printer-ip> -b "dc=example,dc=com" "(objectClass=*)"

This command checks if the LDAP service on the printer is exposed and accessible.

2. Test SMB/FTP Access:

smbclient -L //<printer-ip> -U%

This command lists the shared resources on the printer via SMB.

3. Patch Verification:

ssh admin@<printer-ip> "show version"

Verify the printer’s firmware version to ensure the patch has been applied.

4. Network Scanning for Vulnerable Printers:

nmap -p 389,445 <printer-ip>

Scan for open LDAP (389) and SMB (445) ports on the printer.

5. Disable Unnecessary Services:

ssh admin@<printer-ip> "set ldap disable"
ssh admin@<printer-ip> "set smb disable"

Disable LDAP and SMB services if they are not required.

What Undercode Say:

The vulnerability in Xerox Versalink Multi-Function Printers highlights the importance of securing networked devices, especially those integrated into enterprise environments. Active Directory credentials are a prime target for attackers, and exploiting such vulnerabilities can lead to significant breaches. Regularly updating firmware and disabling unnecessary services are critical steps in mitigating such risks.

In addition to the provided commands, consider implementing network segmentation to isolate printers from sensitive systems. Use tools like `iptables` to restrict access:

iptables -A INPUT -p tcp --dport 389 -j DROP
iptables -A INPUT -p tcp --dport 445 -j DROP

For Windows environments, ensure that Group Policy Objects (GPOs) are configured to enforce secure printer configurations. Use the following PowerShell command to check for open SMB ports:

Test-NetConnection -ComputerName <printer-ip> -Port 445

Regularly audit your network for vulnerabilities using tools like Nessus or OpenVAS. Stay informed about the latest security patches and updates from vendors. Cybersecurity is an ongoing process, and proactive measures are essential to protect your infrastructure.

For further reading on securing networked devices, visit OWASP IoT Security Guidelines.

References:

Hackers Feeds, Undercode AIFeatured Image

Scroll to Top