<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Hacking Devices &#8211; Ensuring your printer is secure</title>
	<atom:link href="http://www.gfi.com/blog/hacking-devices-ensuring-printer-secure/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/hacking-devices-ensuring-printer-secure/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hacking-devices-ensuring-printer-secure</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/hacking-devices-ensuring-printer-secure/comment-page-1/#comment-436</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Thu, 26 Nov 2009 10:04:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1597#comment-436</guid>
		<description><![CDATA[Of course you are right in that an end user will not buy an enterprise printer. However nowadays they don&#039;t need too. For $100 - $200 you can buy not only network printers but also WIFI enabled printers. If a non-technical person buys a printer, he will do so according to his requirements. If he intends to hook it up at work it&#039;s likely that he will not be able to use USB due to restrictions; or he just believes that it should be network simply because all other company printers work that way. In the future it&#039;s very possible that it might get even worse in that a feature included on one printer will be included on other printers by manufacturers so as to appear on par or better than their competition; therefore WIFI is sure to spread among printers. 

Obviously it is a lot less likely that an employee buys a printer of his own accord and just hooks it up at work. However it does happen. One instance is all it takes. It is also unlikely that a cheap printer will have a functionality such as storing copies locally of printed documents, but you don&#039;t know what vulnerabilities it might have. Some time ago I did come across a vulnerability in a printer driver that allowed remote access to any file on the machine on which it was installed. 

Don&#039;t get me wrong, I know all this basically borders on paranoia... well actually it&#039;s more like right in the middle of it; unfortunately in security that&#039;s exactly where you need to be. One weak link is all it takes for all your hard work to crumble.

Finally I perfectly agree with your suggestions. Permissions can definitely help to mitigate this risk and a security procedure on device management can ensure that proper security consideration are considered when installing devices. I would also add monitoring to your list just to be on the safe side. 

As for upnp and bluetooth you&#039;re spot on there as well. Might be a good topic to discuss in a future article. Thanks :)]]></description>
		<content:encoded><![CDATA[<p>Of course you are right in that an end user will not buy an enterprise printer. However nowadays they don&#8217;t need too. For $100 &#8211; $200 you can buy not only network printers but also WIFI enabled printers. If a non-technical person buys a printer, he will do so according to his requirements. If he intends to hook it up at work it&#8217;s likely that he will not be able to use USB due to restrictions; or he just believes that it should be network simply because all other company printers work that way. In the future it&#8217;s very possible that it might get even worse in that a feature included on one printer will be included on other printers by manufacturers so as to appear on par or better than their competition; therefore WIFI is sure to spread among printers. </p>
<p>Obviously it is a lot less likely that an employee buys a printer of his own accord and just hooks it up at work. However it does happen. One instance is all it takes. It is also unlikely that a cheap printer will have a functionality such as storing copies locally of printed documents, but you don&#8217;t know what vulnerabilities it might have. Some time ago I did come across a vulnerability in a printer driver that allowed remote access to any file on the machine on which it was installed. </p>
<p>Don&#8217;t get me wrong, I know all this basically borders on paranoia&#8230; well actually it&#8217;s more like right in the middle of it; unfortunately in security that&#8217;s exactly where you need to be. One weak link is all it takes for all your hard work to crumble.</p>
<p>Finally I perfectly agree with your suggestions. Permissions can definitely help to mitigate this risk and a security procedure on device management can ensure that proper security consideration are considered when installing devices. I would also add monitoring to your list just to be on the safe side. </p>
<p>As for upnp and bluetooth you&#8217;re spot on there as well. Might be a good topic to discuss in a future article. Thanks <img src='http://www.gfi.com/blog/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Leandro Amore</title>
		<link>http://www.gfi.com/blog/hacking-devices-ensuring-printer-secure/comment-page-1/#comment-415</link>
		<dc:creator>Leandro Amore</dc:creator>
		<pubDate>Fri, 20 Nov 2009 20:58:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1597#comment-415</guid>
		<description><![CDATA[Nice post, but although I agree with you in the dangers of unsecure devices, I really don&#039;t think that every person is in danger. I don&#039;t know the consumer habits in your country, but in Argentina it&#039;s not common to buy enterprise printers for personal use so I don&#039;t really see the problem for that kind of users. 
Regarding the enterprise there are two points to be taken into consideration:
1.	The minimum permissions to install a local printer are Local Admin or power user (with the load/unload driver permissions). So, if a company grants those permissions to any user there are bigger problems to be taken care first.
2.	I agree with you that even if installed by IT Professionals, in most cases printers are not taken into considerations from a security point of view. So it&#039;s really important for the security department to write a secure procedure for printer installation and attack surface reduction. We don&#039;t always need all the services that these hardware offers.
Every device, not only printers, should be tested and analyzed by a competent IT Pro before installing it in our networks. Nowadays, most hardware offers lots of new and really comfortable services, but these comfort usually relaxes security.(For  example Upnp or bluethooth.)]]></description>
		<content:encoded><![CDATA[<p>Nice post, but although I agree with you in the dangers of unsecure devices, I really don&#8217;t think that every person is in danger. I don&#8217;t know the consumer habits in your country, but in Argentina it&#8217;s not common to buy enterprise printers for personal use so I don&#8217;t really see the problem for that kind of users.<br />
Regarding the enterprise there are two points to be taken into consideration:<br />
1.	The minimum permissions to install a local printer are Local Admin or power user (with the load/unload driver permissions). So, if a company grants those permissions to any user there are bigger problems to be taken care first.<br />
2.	I agree with you that even if installed by IT Professionals, in most cases printers are not taken into considerations from a security point of view. So it&#8217;s really important for the security department to write a secure procedure for printer installation and attack surface reduction. We don&#8217;t always need all the services that these hardware offers.<br />
Every device, not only printers, should be tested and analyzed by a competent IT Pro before installing it in our networks. Nowadays, most hardware offers lots of new and really comfortable services, but these comfort usually relaxes security.(For  example Upnp or bluethooth.)</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 03:40:40 by W3 Total Cache --