PrinterLogic Print Management Software fails to validate SSL and software update certificates, which could allow an attacker to reconfigure the software and remotely execute code. In addition, the PrinterLogic agent does not sanitize browser input allowing a remote attacker to modify configuration settings. These vulnerabilities may result in a remote attacker executing code on workstations running the PrinterLogic agent.
PrinterLogic versions up to and including 18.104.22.168 are vulnerable to multiple attacks. The PrinterLogic agent, running as SYSTEM, does not validate the PrinterLogic Management Portal's SSL certificate, validate PrinterLogic update packages, or sanitize web browser input.
CVE-2018-5408: The PrinterLogic Print Management software does not validate, or incorrectly validates, the PrinterLogic management portal's SSL certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host. (CWE-295)
An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges.
Update PrinterLogic Print Management Software https://www.printerlogic.com/security-bulletin/.
Thanks to the Adversarial Simulation Team at Sygnia (Sygnia Consulting), led by David Warshavski and Doron Vazgiel, for reporting these vulnerabilities and participating in the coordinated vulnerability disclosure process.
This document was written by Laurie Tyzenhaus.