Thursday, February 20, 2025
HomeCVE/vulnerabilityXerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

Published on

SIEM as a Service

Follow Us on Google News

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered, exposing enterprise networks to credential theft and lateral attacks.

The flaw, discovered by Rapid7 Principal IoT Researcher Deral Heiland, enables malicious actors to intercept Lightweight Directory Access Protocol (LDAP) and Server Message Block (SMB) authentication data through pass-back attacks.

The vulnerabilities, tracked as CVE-2024-12510 and CVE-2024-12511, threaten organizations relying on these widely used devices for printing, scanning, and document management.

The Versalink C7025’s LDAP configuration flaw allows attackers with admin access to redirect authentication requests to rogue servers.

directly compromises Active Directory (AD) integrity
directly compromises Active Directory (AD) integrity

By modifying the LDAP server’s IP address in the printer’s settings, adversaries can capture plaintext credentials through a simple netcat listener.

This method directly compromises Active Directory (AD) integrity, as LDAP is central to user authentication in Windows environments.

For SMB, attackers exploit the device’s address book feature to reroute scan-to-file operations to controlled servers. This tactic harvests NetNTLMv2 handshakes—cryptographic tokens attackers use in relay attacks to infiltrate file servers.

FTP configurations are equally vulnerable, with credentials transmitted in clear text if compromised.

While both attack vectors require administrative privileges or physical console access, enterprises often retain default admin passwords or enable remote management interfaces, lowering the barrier to exploitation.

Printer Console
Printer Console

The implications are severe: captured credentials enable lateral movement, privilege escalation, and data exfiltration across corporate networks.

Xerox has released firmware updates addressing these issues, urging customers to install patches immediately.

Rapid7 recommends additional safeguards: restrict admin access to MFPs, disable unnecessary services like FTP, and implement network segmentation to isolate printers from critical AD infrastructure.

Monitoring for anomalous LDAP/SMB traffic and enforcing multi-factor authentication (MFA) for printer management consoles are also advised.

“These vulnerabilities underscore the risks of treating IoT devices as perimeter appliances rather than core network assets,” Heiland noted.

“Printers, cameras, and sensors often have privileged access but lack robust security controls, making them prime targets for initial breaches.”

The disclosure follows coordinated efforts between Rapid7 and Xerox, reflecting growing scrutiny of IoT device security in hybrid work environments.

For enterprises, the discovery highlights the need to audit connected devices routinely. As MFPs increasingly integrate with cloud services and corporate directories, their role as potential attack vectors grows proportionally.

With credential-based attacks dominating cybersecurity incident reports, mitigating such flaws in edge devices becomes critical to holistic defense strategies.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

PoC Exploit Released for Ivanti EPM Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that...

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and...

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

PoC Exploit Released for Ivanti EPM Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that...

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and...