Samsung printer hack could let the wrong ones in (updated)

Samsung printer hack could let the wrong ones in

Typically, when we think of hacks, our minds conjure images of compromised security systems, personal computers or server farms, but printers? According to Neil Smith, a researcher from the US Computer Emergency Readiness Team, unauthorized access to those devices could be a very real threat — if you happen to own a Samsung model. Discovered and submitted to the agency this past Monday, the exploit unearthed by Smith takes advantage of an “SNMP backdoor” : an internet protocol that allows for remote network administrative control without authentication. The vulnerability — which would give hackers access to data sent to the printer, as well as control over it (think: ceaseless printing!) — affects most units released before November of this year. For its part, Samsung’s promised a patch will be forthcoming. But, in the meantime, if you want to avoid exposing any personal data or the possibility of a seemingly possessed printer, it’s best you steer clear of rogue WiFi connections.

Update: CNET has published a statement from Samsung outlining the update schedule for affected printers. Firmware that fixes the issue will be available for all “current” models by November 30th, and for “all other models” by the end of the year. The company also recommends disabling SNMPv1.2 or switching to SNMPv3 mode until the updates are released.

Filed under: , ,

Comments

Source: ZDNet, CNET

Ubisoft UPlay may accidentally contain web plugin exploit, Ezio would not approve (update: fixed)

Assassin's Creed 2 - Ezio Auditore da Firenze

If you’ve played Assassin’s Creed 2 (or other Ubisoft games), you may have installed more stealthy infiltration than you bargained for. Some snooping by Tavis Ormandy around Ubisoft’s UPlay looks to have have discovered that the service’s browser plugin, meant to launch locally-stored games from the web, doesn’t have a filter for what websites can use it — in other words, it may well be open season for any maliciously-coded page that wants direct access to the computer. Closing the purported, accidental backdoor exploit is thankfully as easy as disabling the plugin, but it could be another knock against the internet integration from a company that doesn’t have a great reputation for online security with its copy protection system. We’ve reached out to Ubisoft to confirm the flaw and learn what the solution may be, if it’s needed. For now, we’d definitely turn that plugin off and continue the adventures of Ezio Auditore da Firenze through a desktop shortcut instead.

Update: That was fast. As caught by Geek.com, the 2.0.4 update to UPlay limits the plugin to opening UPlay itself. Unless a would-be hacker can find a way to compromise the system just before you launch into Rayman Origins, it should be safe to play.

Filed under: ,

Ubisoft UPlay may accidentally contain web plugin exploit, Ezio would not approve (update: fixed) originally appeared on Engadget on Mon, 30 Jul 2012 10:02:00 EDT. Please see our terms for use of feeds.

Permalink TechDirt  |  sourceSeclists.org  | Email this | Comments