Overview
PrinterLogic Print Management Software fails to validate SSL and software update certificates, which could allow an attacker to reconfigure the software and remotely execute code. In addition, the PrinterLogic agent does not sanitize browser input allowing a remote attacker to modify configuration settings. These vulnerabilities may result in a remote attacker executing code on workstations running the PrinterLogic agent.
Description
PrinterLogic versions up to and including 18.3.1.96 are vulnerable to multiple attacks. The PrinterLogic agent, running as SYSTEM, does not validate the PrinterLogic Management Portal's SSL certificate, validate PrinterLogic update packages, or sanitize web browser input. CVE-2018-5408: The PrinterLogic Print Management software does not validate, or incorrectly validates, the PrinterLogic management portal's SSL certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host. (CWE-295) |
Impact
An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges. |
Solution
Update PrinterLogic Print Management Software https://www.printerlogic.com/security-bulletin/. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 7.8 | AV:N/AC:M/Au:N/C:P/I:C/A:N |
Temporal | 7.8 | E:ND/RL:ND/RC:ND |
Environmental | 7.8 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- https://www.printerlogic.com/security-bulletin/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5408
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5409
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9505
- https://cwe.mitre.org/data/definitions/295.html
- https://cwe.mitre.org/data/definitions/494.html
- https://cwe.mitre.org/data/definitions/159.html
Acknowledgements
Thanks to the Adversarial Simulation Team at Sygnia (Sygnia Consulting), led by David Warshavski and Doron Vazgiel, for reporting these vulnerabilities and participating in the coordinated vulnerability disclosure process.
This document was written by Laurie Tyzenhaus.
Other Information
CVE IDs: | CVE-2018-5408, CVE-2018-5409, CVE-2019-9505 |
Date Public: | 2019-05-03 |
Date First Published: | 2019-05-03 |
Date Last Updated: | 2019-05-22 14:19 UTC |
Document Revision: | 59 |