Thursday, March 28, 2024

Millions of Printers Worldwide Vulnerable To The 16-Year-Old Bug

Cybersecurity analysts have recently discovered a vulnerability in a common printer driver used by major manufacturers like HP, Xerox, and Samsung.

This occurrence was alerted by the security experts of SentinelOne security firm, and they have tracked this vulnerability with the following CVE ID:-

  • CVE-2021-3438

They have claimed that since 2005 which means for 16 years this flaw has been hidden in the common printer driver of the major global brands like HP, Xerox, and Samsung.

It seems that the printer-related problems that are falling in 2021 are far more dangerous and quite unexpected.

Flaw profile

  • CVE ID: CVE-2021-3438
  • Bug Summary: It is a buffer overflow vulnerability.
  • CVSS: 8.8
  • Severity: High

Severe Vulnerability

Apart from this, the cybersecurity experts have affirmed that the CVE-2021-3438 is a buffer overflow vulnerability that is present in the print driver SSPORT.SYS file.

The vulnerability CVE-2021-3438 has existed since 2005 and that’s why it affects hundreds of millions of devices and users worldwide. And by exploiting this flaw an attacker can gain elevated privileges on the affected system.

The experts explained that with the printer software the vulnerable driver gets installed automatically, and after the installation, whenever the Windows will restart it will be loaded.

In short, this simple regular mechanism will allow the bug to become more vulnerable and exploitable since this will allow an attacker to attack the vulnerable devices when they are not even connected to the system.

This whole thing could lead an attacker to take complete control of the affected computer. Since, the experts have concluded that taking advantage of the vulnerability in the driver was not very difficult, and didn’t require user intervention. 

If an attacker managed to gain basic permissions then it could be scaled to System, and even allow the attacker to run code in the kernel. And this will lead the attacker to evade the security tools and security mechanisms of the OS.

Things that an attacker will be able to do after successful exploitation:-

  • Install programs
  • View programs and files
  • Change programs
  • Encrypt programs and files
  • Delete data
  • Create new users with admin permissions 

Affected Devices

While if we talk about the affected devices, then specifically more than 380 different HP and Samsung printers are affected, and 12 Xerox devices are affected by this flaw.

Affected devices of HP and Samsung (Full list).

Affected devices of Xerox:-

  • Xerox B205
  • Xerox B210
  • Xerox B215
  • Phaser 3020
  • Phaser 3052
  • Phaser 3260
  • Phaser 3320
  • WorkCentre 3025
  • WorkCentre 3215
  • WorkCentre 3225
  • WorkCentre 3315
  • WorkCentre 3325

Remediation

After the discovery of PrintNightmare vulnerability, several cybersecurity researchers become alerted and decided to take a closer look at Windows printing APIs; and as a result, they ended up finding more vulnerabilities.

However, this vulnerability has now been fixed, and the security researchers have strongly urged both enterprises and consumers to apply the security patch immediately from the manufacturer’s website.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles