Home » News » Critical vulnerabilities are found in PrinterLogic Print Management

Critical vulnerabilities are found in PrinterLogic Print Management

Vulnerabilities in PrinterLogic Print Management software allow attackers remotely perform code on the final points with system privileges.

Specialists from Software Engineering Institute from Carnegie Mellon University discovered these vulnerabilities.

Issues involve PrinterLogic Print Management versions and earlier.

The most dangerous vulnerability is in absent of checks for SSL-certificates and certificates with signed updates for software, so attackers can change program configurations.

Moreover, PrinterLogic agent does not check initial browser input data and attacker can use it for changing of configuration settings.

Attacker can use invalid or malware certificate and with the help of “man-in-the-middle” attack make program connect to malware host or accept malware data that was sent by the allegedly reliable source.

In the CVSS system of hazards evaluation vulnerability (CVE-2018-5408) scored 7,8 point of 10 possible.

Second vulnerability (CVE-2018-5409) exists hence PrinterLogic Print Management updates and performs a code without check of its origin and uniformity. Attacker can perform random code by compromising trusted host, DNS-spoofing or code modification in the process of transition.

Third problem is in absence of sufficient check of special symbols, due to it attacker can remotely make unsanctioned changes in the configuration files.

Solution from Software Engineering Institute specialists:

Update PrinterLogic Print Management Software when patches become available.

Consider using ‘always on’ VPN to prevent some of the MITM scenarios and enforce application whitelisting on the endpoint to prevent the PrinterLogic agent from executing malicious code.

Source: https://kb.cert.org

[Total: 0    Average: 0/5]
READ  Iranian hackers APT34 use LinkedIn to deliver a backdoor

About Trojan Killer

Carry Trojan Killer Portable on your memory stick. Be sure that you’re able to help your PC resist any cyber threats wherever you go.

Check Also

Trojan Casbaneiro used YouTube

Casbaneiro banking Trojan used YouTube to steal cryptocurrency

Eset studied the new Casbaneiro family of banking Trojans. A malicious program hunted for cryptocurrency …

Hackers attacked Volusion Platform

Hackers attacked Volusion cloud-based e-commerce platform

Attackers compromised Volusion’s cloud-based e-commerce platform infrastructure. Hackers attacked it and injected a malicious code …

Leave a Reply