This story appeared on Network World at

http://www.networkworld.com/columnists/2007/042307bradner.html

 

Undercover (and vulnerable) computers

 

By Scott Bradner, Network World, 04/23/07

 

It is hardly surprising that few pieces of electronics get built these days without one or more computers hidden inside. What is somewhat surprising is that too many of these computers are directly addressable on your network and are running Web or SNMP servers that can present significant hacking opportunities when imperfectly programmed. In many cases, they can also present significant threats to your privacy without any hacking required.

 

There seem to be Web and SNMP servers in everything (for example, Google gets 373,000 hits for "embedded Web server"). They show up in all sorts of network infrastructure gear, plug strips, home theater systems, environmental control systems, UPSs, test equipment, and, most relevant for this column, network-connected printers.

 

Some people have worried about the security threat of having a printer with a hackable computer in it for quite a while. The oldest story I ran across is from 1998 and I'm sure there are much older ones. More recently, security expert Brendan O'Connor gave a talk at last fall's Black Hat conference, which was reported on by Bruce Schneier

 

There are two problems these devices: they create a hackable computer inside your network's security perimeter, and in the case of printers, they can present a major privacy and security threat.

 

The hacking problem is made significantly worse by the fact that most people do not check software updates for printers. So even if the printer vendor were to put out a software update including a security fix, very few printers will get updated.

 

But the second problem cannot be addressed with a bug fix because the system is working as it was designed. For example, many medium to high-end workgroup printers now have disk drives where they store print jobs. They also have Web servers that users can interact with to schedule when jobs are to be printed or to reprint old jobs. Many of the printers only remove old print files when they run out of room on the disk. (At least one printer has an extra cost option that will purge day-old files -- the vendor wants you to pay extra for something that should come standard.)

 

Because printer manufacturers seem to think that everyone in a company is a saint, many of the printers let anyone who accesses the Web server print any file (and with a little hacking, maybe grab the file over the 'Net).

 

In many cases the person who installed the printer never knew it had a Web server in it. I speak from personal experience after just figuring out that my high-end Epson photo printer includes an automatically enabled Web server that is using the default password, which I have not figured out yet. Needless to say, the printer will be off and filtered until I can find out what the password is and reset it.

 

The lesson here is to find out how overly helpful a printer is and whether it meets your security and privacy rules before you buy and install it on your sensitive network.

 

Disclaimer: Harvard is all about lessons and I expect this one is being learned somewhere on campus. But the university has not expressed an opinion on too-smart printers -- I have.

 

All contents copyright 1995-2007 Network World, Inc. http://www.networkworld.com