Ineffective configuration on Lexmark printers
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Threat details
The printers have been found to come preset with a default password or no password at all. These printers are accessible over TCP Ports 21, 23, 80 and 443 which can be accessed by attackers. Port 23 uses Telnet, which is an outdated protocol. Unlike the more secure SSH, Telnet is un-encrypted, meaning attackers could listen to all traffic on that port with a man in the middle attack (MitM). Port 21 presents its own security holes as it uses FTP (File Transfer Protocol) which is also un-encrypted. This all allows an attacker to remotely access the devices and view its status, MAC address, configuration as well as passwords.
Attackers can upload potentially malicious documents to the printer programming. This can also be used as a backdoor into the network allowing them to attack other systems and devices.
Remediation steps
Last edited: 17 February 2020 11:32 am