치명적인 취약점이 PrinterLogic 인쇄 관리에서 발견된다

PrinterLogic 인쇄 관리 소프트웨어의 취약점은 공격자가 원격으로 시스템 권한으로 최종 점에서 코드를 수행 할 수.

에스pecialists from Software Engineering Institute from Carnegie Mellon University discovered these vulnerabilities.

문제 PrinterLogic 인쇄 관리 버전을 포함 18.3.1.96 이전.

가장 위험한 취약점은 소프트웨어에 대한 서명 업데이트와 SSL - 인증서 및 인증서에 대한 검사의 부재에있다, so attackers can change program configurations.

그 위에, PrinterLogic agent does not check initial browser input data and attacker can use it for changing of configuration settings.

Attacker can use invalid or malware certificate and with the help of “man-in-the-middle” attack make program connect to malware host or accept malware data that was sent by the allegedly reliable source.

In the CVSS system of hazards evaluation vulnerability (CVE-2018-5408) 득점 7,8 point of 10 possible.

Second vulnerability (CVE-2018-5409) exists hence PrinterLogic Print Management updates and performs a code without check of its origin and uniformity. Attacker can perform random code by compromising trusted host, DNS-spoofing or code modification in the process of transition.

Third problem is in absence of sufficient check of special symbols, due to it attacker can remotely make unsanctioned changes in the configuration files.

Solution from Software Engineering Institute specialists:

Update PrinterLogic Print Management Software when patches become available.

Consider using ‘always onVPN to prevent some of the MITM scenarios and enforce application whitelisting on the endpoint to prevent the PrinterLogic agent from executing malicious code.

출처: https://kb.cert.org

폴리나 리소프스카야

저는 몇 년 동안 마케팅 관리자로 일하고 있으며 흥미로운 주제를 찾는 것을 좋아합니다.

회신을 남겨주

맨 위로 돌아가기 버튼