Thursday, March 28, 2024
Search
English
Optical Storage
Graphics Cards
General Computing
PC Parts
Digital Cameras
Consumer Electronics
Games
Mobiles
All News Categories
Older News
Optical Storage
Graphics Cards
General Computing
PC Parts
Digital Cameras
Consumer Electronics
Games
Cooling Systems
Mobiles
Software Reviews
Reviews Around the Web
Technology Previews
Essays
Interviews
Tech Views
Glossary
FAQ
Guides/How-To's
Firmware
Drivers
BIOS
Software
Media Tests
Drive Comparisons
DVD Media Formats
All Forums
Become Member
Today's Posts
Popular Topics
In-House
Optical Storage
Optical Storage Software
General
Consumer Electronics
Other
News Around The Web
Advertise
Links
Jobs
Site Map
News/Reviews Feed
Submit News
Polls
Competitions
Users' Privacy
Contact Us
About
Home
|
News
|
Reviews
|
Articles
|
Guides
|
Download
|
Expert Area
|
Forum
|
Site Info
Wednesday, November 28, 2012
Samsung Printers Found Open To Hacking
You are sending an email that contains the article
and a private message for your recipient(s).
Your Name:
Your e-mail:
* Required!
Recipient (e-mail):
*
Subject:
*
Introductory Message:
HTML/Text
(Photo: Yes/No)
(At the moment, only Text is allowed...)
Message Text:
Certain Samsung printers and other made by Samsung and sold under the Dell brand may be targetted by hackers, United States Computer Emergency Readiness Team (US-CERT) reports.
Samsung printers as well as some Dell printers manufactured by Samsung contain a hardcoded account that could allow a remote attacker to take control of an affected device, US-CERT said. The hardcoded Simple Network Management Protocol (SNMP) full read-write community string remains active even when SNMP is disabled in the printer management utility, the organization added. This means that a remote, unauthenticated attacker could access an affected device with administrative privileges and be free to make changes to the device configuration, access to sensitive information or leverage further attacks through arbitrary code execution.
Samsung has stated that models released after October 31, 2012 are not affected by this vulnerability.
Samsung also said that they will be releasing a patch tool later this year to address vulnerable devices.
As a general good security practice for system admins is to only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from accessing an SNMP interface using the affected credentials from a blocked network location.
Home
|
News
|
All News
|
Reviews
|
Articles
|
Guides
|
Download
|
Expert Area
|
Forum
|
Site Info
Site best viewed at 1024x768+ -
CDRINFO.COM
1998-2024 - All rights reserved
-
Privacy policy
-
Contact Us
.