Multiple vulnerabilities in enterprise-grade Xerox Versalink C7025 multifunction printers (MFPs) enable attackers to intercept authentication credentials from Lightweight Directory Access Protocol (LDAP) and Server Message Block (SMB) services.
Designated as CVE-2024-12510 and CVE-2024-12511, these flaws allow malicious actors to execute “pass-back attacks” – a technique that redirects device authentication attempts to attacker-controlled systems.
The vulnerabilities, discovered by Rapid7 Principal IoT Researcher Deral Heiland, affect firmware versions 57.69.91 and earlier on Xerox’s widely deployed enterprise printers.
The LDAP vulnerability enables attackers with administrative access to the printer’s web interface to reconfigure the LDAP server IP address to a rogue host.
Once modified, any LDAP authentication attempt initiated through the printer’s “User Mappings” feature transmits clear-text credentials to the attacker’s server.
This attack preys on organizations using LDAP for centralized user authentication, requiring:
Security analysts demonstrated the attack using a Python-based LDAP listener, capturing credentials in real time during printer-initiated authentication requests.
The harvested credentials could grant attackers access to enterprise directories containing sensitive user attributes and permissions.
The secondary vulnerability targets the printer’s scan-to-network functionality. Attackers modifying SMB/FTP server entries in the device’s address book can redirect file scans to malicious hosts. This technique captures:
Metasploit’s auxiliary/server/capture/smb module can harvest NetNTLMv2 challenges, which attackers then crack offline or relay to domain-joined systems.
Researchers’ testing showed successful compromise of domain admin accounts when printers used privileged service accounts for scan-to-folder workflows.
These vulnerabilities present critical risks due to:
Persistence Opportunities: Captured SMB hashes facilitate golden ticket attacks and persistent AD footholds.
Physical Access Exploitation: Attackers could execute attacks locally via the printer’s control panel without needing network access.
In one demonstrated attack chain, researchers gained admin access via default credentials (Xerox devices often retain factory defaults), modified LDAP settings to attacker IP, triggered LDAP sync via “Test Connection” feature and used captured credentials to access HR databases containing PII.
Mitigation Strategies
Xerox released patched firmware (version 57.69.92+) addressing both CVEs. If immediate patching isn’t feasible:
With patched firmware now available, organizations must act swiftly to close this attack vector before threat actors exploit these vulnerabilities in the wild.
Google has announced a significant security initiative that will fundamentally change how Chrome handles unsecured…
A persistent vulnerability related to DLL hijacking has been identified in the Narrator accessibility tool,…
CISA has added two critical vulnerabilities affecting Dassault Systèmes DELMIA Apriso to its Known Exploited…
A threat actor has claimed responsibility for breaching HSBC USA, alleging possession of a vast…
A vulnerability in Google Messages on Wear OS devices allows any installed app to silently…
The Beast ransomware group has emerged as a significant threat in the cybersecurity landscape, evolving…