Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

Skechers make kids shoes with hidden air tag compartments

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » A flaw in the new Xerox printer allows attackers to capture Windows Active Directory credentials
Identity

A flaw in the new Xerox printer allows attackers to capture Windows Active Directory credentials

userBy userFebruary 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 18, 2025Ravi LakshmananVulnerability/Enterprise Security

Windows Active Directory Credentials

The security vulnerability is disclosed in the Xerox Versalink C7025 Multifunction Printer (MFPS), where attackers capture authentication credentials via passback attacks via Lightweight Directory Access Protocol (LDAP) and SMB/FTP services can.

“This passback-style attack takes advantage of a vulnerability that allows malicious actors to change the configuration of MFPs and allow MFP devices to send authentication credentials to malicious actors.”

“If malicious actors can take advantage of these issues, they will be able to capture Windows Active Directory credentials, which can move horizontally within your organization’s environment, and other important Windows servers and other important Windows servers and It means you can compromise on your file system.”

Cybersecurity

Identified vulnerabilities affecting firmware versions 57.69.91 and earlier are listed below –

The successful exploitation of CVE-2024-12510 could lead to redirecting credentials to Rogue Server and publishing credentials. However, this requires an attacker to access the LDAP configuration page, and LDAP is used for authentication.

Similarly, CVE-2024-12511 allows malicious actors to access the user address book configuration to change the IP address of the SMB or FTP server, point to the host under control, and to enable SMB or FTP authentication credentials to be used. Capture file scan operation.

“To make this attack successful, the attacker must configure SMB or FTP scan functionality within the user’s address book, and also to physical access to the printer console or to the remote control console via the web interface. “We need access to the site,” Heiland said. . “This may require admin access unless user-level access to the remote control console is enabled.”

Following the responsible disclosure on March 26, 2024, the vulnerability was addressed as part of Service Pack 57.75.53, which was released later last month for Versalink C7020, 7025, and 7030 series printers.

Cybersecurity

If immediate patching is not an option, it is recommended that users set complex passwords for their administrative accounts, avoid using privileged Windows authentication accounts, and disable the remote control console for uncertified users I will.

This development has impacted Peyton Smith in detail, and has influenced a widely deployed healthcare software named HealthStream MSOW (CVE-2024-56735), leading to a complete database compromise, and threat actors This occurs because it affects the widely deployed healthcare software (CVE-2024-56735), which can allow access to 23 sensitive data. Healthcare organizations from the public internet.

The company said it has identified 50 instances of MSOW instances exposed to the internet, 23 of which are susceptible to security drawbacks.

The vulnerability “can cause the entire database to be returned in band, meaning that an attacker can retrieve plaintext database content in an HTTP response from the created SQL injection HTTP payload,” Smith said. .

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWisconsin voters narrow down the field of top education candidates
Next Article Toronto Delta plane crash: Why did the aircraft turn over when it landed | Aviation News
user
  • Website

Related Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

July 30, 2025

Funksec Ransomware Decryptor was published for free after the group was dormant

July 30, 2025

Enabling remote hijacking via critical duffer camera defect ONVIF and file upload exploit

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

Skechers make kids shoes with hidden air tag compartments

2 How Uc Berkeley Dropout raised $28 million for AI Marketing Automation Startup

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.