Vulnerabilities in fax machines could let hackers infiltrate a network

All-in-one devices should now be considered a possible infiltration vector into the corporate network, researchers warn

fax machine with send button pressed

Researchers have discovered several critical vulnerabilities in the fax functionalities of all-in-one printers that can allow an attacker to seize complete control of a machine.

Seeking to establish what an attacker could accomplish armed with just a phone line and a target fax number, Check Point Research found that by sending a maliciously-crafted fax it was possible to infiltrate an organisation's network.

Advertisement - Article continues below

Disclosing the vulnerabilities at DEFCON 26, hosted in Las Vegas, yesterday, they showcased how an attacker could then maximise this opportunity via EternalBlue, a leaked NSA-developed hacking tool, to exploit any PC connected to the same network.

The infiltrated computers can be used to send data back to the attacker by sending another fax.

"Using nothing but a phone line, we were able to send a fax that could take full control over the printer, and later spread our payload inside the computer network accessible to the printer," said Check Point Research's Eyal Itkin and Yaniv Balmas.

"We believe that this security risk should be given special attention by the community, changing the way that modern network architectures treat network printers and fax machines.

"From now on, a fax machine should be treated as a possible infiltration vector into the corporate network."

The team of researchers tested their exploit on HP Officejet Pro 6830 all-in-one printers, but said they "strongly believe that similar vulnerabilities apply to other fax vendors too as this research concerns the fax communication protocols in general".

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Despite being considered a technological relic in the age of instant messaging, text and video calls, fax machines are still widely-used in businesses and organisations across the world.

For instance, Check Point Research estimated there are more than 300 million fax numbers in use, while they say financial reports from Wall Street reveal tens of millions of all-in-one printers are sold worldwide each year.

Meanwhile, a poll conducted by the Royal College of Surgeons (RCS) last month revealed that almost 9,000 fax machines are in use across the NHS - highlighting the widespread use of fax technology in the UK public sector, and the accompanying security risks.

Check Point Research said it worked closely with HP to fix the vulnerability after alerting them to the issues in May, culminating in a patch that was released on 1 August. But the research team said the vulnerability is not exclusive to all-in-one printers and that similar flaws may be found in fax-to-mail services and standalone fax machines.

Although they haven't spotted this exploit being executed in a real-world context, the researchers nonetheless recommended that HP Officejet all-in-one users follow the vendor's instructions on patching their printers.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/security/ethical-hacking/356252/poorly-secured-banking-apps-lead-to-cyber-threats
ethical hacking

Mobile banking apps are exposing user data to attackers

26 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/policy-legislation/data-protection/356344/eu-institutions-warned-against-purchasing-any-further
data protection

EU institutions told to avoid Microsoft software after licence spat

3 Jul 2020
Visit/mobile/mobile-phones/356335/the-man-has-ruined-my-huawei-p40
Mobile Phones

The Man has ruined my Huawei P40

3 Jul 2020