vulnerabilidades críticas se encuentran en Administración de impresión PrinterLogic

Las vulnerabilidades en el software de administración de impresión PrinterLogic permite a un atacante remoto realizan código en los puntos finales con privilegios del sistema.

Specialists from Software Engineering Institute from Carnegie Mellon University discovered these vulnerabilities.

Cuestiones implican PrinterLogic versiones Administración de impresión 18.3.1.96 y anteriores.

La vulnerabilidad más peligrosa es en ausencia de controles para SSL certificados y certificados firmados con actualizaciones para el software, so attackers can change program configurations.

Además, PrinterLogic agent does not check initial browser input data and attacker can use it for changing of configuration settings.

Attacker can use invalid or malware certificate and with the help of “man-in-the-middle” attack make program connect to malware host or accept malware data that was sent by the allegedly reliable source.

In the CVSS system of hazards evaluation vulnerability (CVE-2018-5408) anotado 7,8 point of 10 possible.

Second vulnerability (CVE-2018-5409) exists hence PrinterLogic Print Management updates and performs a code without check of its origin and uniformity. Attacker can perform random code by compromising trusted host, DNS-spoofing or code modification in the process of transition.

Third problem is in absence of sufficient check of special symbols, due to it attacker can remotely make unsanctioned changes in the configuration files.

Solution from Software Engineering Institute specialists:

Update PrinterLogic Print Management Software when patches become available.

Consider using ‘always onVPN to prevent some of the MITM scenarios and enforce application whitelisting on the endpoint to prevent the PrinterLogic agent from executing malicious code.

Fuente: https://kb.cert.org

Polina Lisovskaya

Trabajo como gerente de marketing desde hace años y me encanta buscar temas interesantes para ti.

Deja una respuesta

Botón volver arriba