In accordance with a just lately launched advisory, a number of safety vulnerabilities have been noticed in PrinterLogic Print Administration Software program. As a lot as three completely different safety vulnerabilities in PrinterLogic Software program might enable distant code execution by a possible attacker.
PrinterLogic Software program Vulnerabilities
A CERT/CC security advisory highlights three completely different vulnerabilities in PrinterLogic Software program. These safety flaws existed because the Print Administration Software program did not validate the SSL certificates.
As acknowledged within the advisory, these vulnerabilities might let an attacker execute remote codes.
“An unauthenticated attacker could possibly remotely execute arbitrary code with SYSTEM privileges.”
The primary of the three vulnerabilities (CVE-2018-5408) existed attributable to improper certificates validation.
“The PrinterLogic Print Administration software program doesn’t validate, or incorrectly validates, the PrinterLogic administration portal’s SSL certificates.”
This might enable an attacker to spoof a trusted entity by MiTM assaults.
The opposite vulnerability, CVE-2018-5409, might lead to downloading a code with out checking its origin or integrity. This might enable an attacker to carry out DNS spoofing, compromise host server, or modify codes in transit.
The third vulnerability (CVE-2019-9505) occurred because of the software program’s failure in sanitizing particular characters.
“PrinterLogic Print Administration software program doesn’t sanitize particular characters permitting for distant unauthorized adjustments to configuration recordsdata.”
Patches To Arrive Shortly
The issues allegedly have an effect on all PrinterLogic Software program variations together with and earlier than 22.214.171.124. All these software program variations stay susceptible to a number of assaults.
For now, no patches can be found for the three bugs. Nonetheless, the customers should guarantee updating to the most recent patched model as quickly as it’s obtainable.
In the meantime, customers can apply safety procedures to mitigate cyber threats, similar to utilizing ‘always-on’ VPN to forestall MiTM assaults. As really helpful,
“Think about using ‘all the time on’ VPN to forestall a few of the MITM eventualities and implement utility whitelisting on the endpoint to forestall the PrinterLogic agent from executing malicious code.”
Take your time to touch upon this text.