IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Thousands of printers at risk of denial of service attacks

Attackers can easily manipulate the 9100 port to hijack hardware and steal data, researchers claim

An abstract mock up of a blue padlock on a binary code background

Researchers have highlighted a trio of potential attacks against printers that could allow denial of service, information theft, or botnet compromise.

The collection of attacks, labeled Printjack, appeared in a paper from researchers Giampaolo Bella and Pietro Biondi at the Universit`a di Catania and Istituto di Informatica e Telematica in Italy.

The attacks all focus on the 9100 port, which printers commonly use to accept print jobs. Printers frequently expose this port to the open internet, which can render them vulnerable to attack, the paper warns.

"Raw port 9100 printing is massively used worldwide. For example, we observe that it is the default print method that the Common UNIX Printing System (CUPS) leverages, and that CUPS is vastly used in modern Linux distributions and Apple systems," it said. However, it noted that this didn't seem to be the case on Windows systems.

The researchers noted three possible attacks. These include a 'paper DoS', in which attackers send print jobs in an infinite loop until a printer exhausts its paper supply. This attack is effectively a modern version of an old hack in which attackers send an endless loop of paper to a fax machine. The researchers successfully tested the hack on 20 of their own printers using a 12-line Python script.

Another attack threatens the confidentiality of data sent to a printer across the network. The researchers used the Ettercap network traffic interception suite, along with the Wireshark network traffic analysis tool to analyze printer jobs sent across a network, and found that they were sent in plain text. They speculated that an intruder could launch a man in the middle (MITM) attack and intercept that job, potentially putting confidential information at risk.

Related Resource

The top three IT pains of the new reality and how to solve them

Driving more resiliency with unified operations and service management

Man at his computer next to title card - whitepaper from ServiceNowFree download

"Because printing is still common practice today, we cannot fully justify why data stored on a server would normally be protected and, by contrast, data sent off for printing would not," they said. They added that this might put companies in violation of the GDPR privacy regulation.

Finally, Bella and Biondi note the possibility of a botnet-style attack in which printers could be compromised en masse, although they did not test this attack in practice. Instead, they pointed to several known vulnerabilities that allow remote code execution.

Using the Shodan IoT search engine to search for printers with open 9100 ports, researchers found the largest percentage in Germany, with the second biggest collection in Russia, closely followed by France.

Featured Resources

Mastering retention

Turning user behaviour insights into retention strategies

Free Download

Dell PowerEdge with AMD

IT applications and infrastructure are the prime catalyst for new revenue creation

Free Download

Building for success with off-premises private cloud

Leveraging co-location facilities to execute your cloud strategy

Free Download

Cyber resiliency and end-user performance

Reduce risk and deliver greater business success with cyber-resilience capabilities

Free Download

Recommended

How do wireless printers work?
Hardware

How do wireless printers work?

11 Aug 2022
How do laser printers work?
peripherals

How do laser printers work?

11 Aug 2022
HP Deskjet 2710e review: A cheap compact printer that won’t exceed your expectations
peripherals

HP Deskjet 2710e review: A cheap compact printer that won’t exceed your expectations

29 Jul 2022
How to add a printer to macOS
operating systems

How to add a printer to macOS

22 Jul 2022

Most Popular

46 US states call for Meta monopoly lawsuit to be reinstated
mergers and acquisitions

46 US states call for Meta monopoly lawsuit to be reinstated

20 Sep 2022
Anonymous hacks Iranian government and state broadcasters
cyber attacks

Anonymous hacks Iranian government and state broadcasters

22 Sep 2022
Why collaboration is key to digital transformation
Sponsored

Why collaboration is key to digital transformation

13 Sep 2022