Hackers can steal data from the enterprise using only a fax number
Fax machines are still widely used by businesses and a communications protocol vulnerability is leaving them exposed to cyberattacks.
By Charlie Osborne | August 12, 2018
On Sunday at Def Con 26 in Las Vegas, Check Point Malware Research Team … demonstrated the existence of the security flaws in the HP Officejet Pro All-in-One fax printer range; specifically, the HP Officejet Pro 6830 all-in-one printer and OfficeJet Pro 8720.
…
The vulnerabilities discovered included a stack-based buffer overflow security flaw and “Devil’s Ivy,” (CVE 2017-976), which permits remote code execution through database handling errors.
According to the researchers, an image file can be coded with malware including ransomware, cryptominers, or surveillance tools. Vulnerabilities in the fax machines’ communication protocols can then be exploited to decode and upload the malware payloads to memory.
…
Check Point disclosed its findings to HP, which developed and deployed firmware patches in response … “The same protocols are also used by many other vendors’ faxes and multifunction printers, and in online fax services such as fax2email, so it is likely that these are also vulnerable to attack by the same method,” the team said.
Read the full article here
