Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Blue Origin sticks to first landing of New Glenn rocket, launches NASA spacecraft

Russian hackers create 4,300 fake travel websites to steal hotel guests’ payment data

Defending Apple’s $230 iPhone socks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » A flaw in the new Xerox printer allows attackers to capture Windows Active Directory credentials
Identity

A flaw in the new Xerox printer allows attackers to capture Windows Active Directory credentials

userBy userFebruary 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 18, 2025Ravi LakshmananVulnerability/Enterprise Security

Windows Active Directory Credentials

The security vulnerability is disclosed in the Xerox Versalink C7025 Multifunction Printer (MFPS), where attackers capture authentication credentials via passback attacks via Lightweight Directory Access Protocol (LDAP) and SMB/FTP services can.

“This passback-style attack takes advantage of a vulnerability that allows malicious actors to change the configuration of MFPs and allow MFP devices to send authentication credentials to malicious actors.”

“If malicious actors can take advantage of these issues, they will be able to capture Windows Active Directory credentials, which can move horizontally within your organization’s environment, and other important Windows servers and other important Windows servers and It means you can compromise on your file system.”

Cybersecurity

Identified vulnerabilities affecting firmware versions 57.69.91 and earlier are listed below –

The successful exploitation of CVE-2024-12510 could lead to redirecting credentials to Rogue Server and publishing credentials. However, this requires an attacker to access the LDAP configuration page, and LDAP is used for authentication.

Similarly, CVE-2024-12511 allows malicious actors to access the user address book configuration to change the IP address of the SMB or FTP server, point to the host under control, and to enable SMB or FTP authentication credentials to be used. Capture file scan operation.

“To make this attack successful, the attacker must configure SMB or FTP scan functionality within the user’s address book, and also to physical access to the printer console or to the remote control console via the web interface. “We need access to the site,” Heiland said. . “This may require admin access unless user-level access to the remote control console is enabled.”

Following the responsible disclosure on March 26, 2024, the vulnerability was addressed as part of Service Pack 57.75.53, which was released later last month for Versalink C7020, 7025, and 7030 series printers.

Cybersecurity

If immediate patching is not an option, it is recommended that users set complex passwords for their administrative accounts, avoid using privileged Windows authentication accounts, and disable the remote control console for uncertified users I will.

This development has impacted Peyton Smith in detail, and has influenced a widely deployed healthcare software named HealthStream MSOW (CVE-2024-56735), leading to a complete database compromise, and threat actors This occurs because it affects the widely deployed healthcare software (CVE-2024-56735), which can allow access to 23 sensitive data. Healthcare organizations from the public internet.

The company said it has identified 50 instances of MSOW instances exposed to the internet, 23 of which are susceptible to security drawbacks.

The vulnerability “can cause the entire database to be returned in band, meaning that an attacker can retrieve plaintext database content in an HTTP response from the created SQL injection HTTP payload,” Smith said. .

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWisconsin voters narrow down the field of top education candidates
Next Article Toronto Delta plane crash: Why did the aircraft turn over when it landed | Aviation News
user
  • Website

Related Posts

Russian hackers create 4,300 fake travel websites to steal hotel guests’ payment data

November 13, 2025

Fake Chrome extension “Safery” uses Sui blockchain to steal Ethereum wallet seed phrases

November 13, 2025

Why 2026 will be the year of machine speed security

November 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Blue Origin sticks to first landing of New Glenn rocket, launches NASA spacecraft

Russian hackers create 4,300 fake travel websites to steal hotel guests’ payment data

Defending Apple’s $230 iPhone socks

CISA warns federal agencies to patch flawed Cisco firewalls amid ‘active exploitation’ across US government

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.