Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New Xerox Printer Disadvantages can allow the attackers to seize Windows Active Directory credentials
Global Security

New Xerox Printer Disadvantages can allow the attackers to seize Windows Active Directory credentials

AdminBy AdminFebruary 18, 2025No Comments3 Mins Read
Windows Active Directory Credentials
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 18, 2025Red LakshmananVulnerability / safety of businesses

Windows Active Directory account

Security vulnerabilities were disclosed in the Xerox Versalink C7025 multifunctional printers (MFPS), which could allow the attackers to record authentication accounts using the opposite attacks using the catalog access protocol (catalogs (catalogs.Ldap) and SMB/FTP services.

“This passage attack uses vulnerability that allows malicious actors to change the MFP configuration and force the MFP device to send authentication data back to the malicious actor,” Rapid7 Deral Heland security researcher – Note.

“If a malicious actor can successfully use these problems, it will allow them to seize the accounts for Windows Active Directory. This means that they can then move toward the organization and threaten other critical servers and file systems.”

Cybersecurity

Revealed vulnerabilities that affect the firmware 57.69.91 and earlier, below – below –

Successful Operation CVE-2024-12510 can allow redirecting information about authentication to the Rogue server, potentially exposing the credentials. This, however, requires the attacker to access the LDAP configuration page, and LDAP is used to authenticate.

CVE-2024-12511 also allows malicious actors to access the user’s address to change the IP address SMB or FTP server and make it guidance under their control, resulting in SMB or FTP credentials during operations File scanning.

“In order for this attack to be successful, the attacker requires the establishment of SMB or FTP scanning in the user’s address book, as well as physical access to the printer console or access to the remote control through the web interface,” Hayland said. “This may require administrator access unless the user levels are included to the remote control console.”

Following a responsible disclosure of information on March 26, 2024. The vulnerability was addressed as part of Service Package 57.75.53 Released at the end of last month for the Versalink C7020, 7025 and 7030 series printers.

Cybersecurity

If immediate correction is not an option, the users are advised to install a complex password for the administrator account, avoid using Windows authentication accounts that have increased privileges, and disable remote control for unauthorized users.

Development comes as a specialist and CEO Peyton Smith talked in detail about the unauthorized vulnerability of SQL injection, which affects the widely expanded health care software named Healthstream msow (CVE-2024-56735), which can lead to a complete compromise in the database, allowing the subject threat to access sensitive data of 23 healthcare organizations from public Internet.

The company said it determined 50 copies subjected to the Internet, of which 23 are sensitive to security deficiencies.

Vulnerability can allow “the entire database can be returned in the range, which means the attacker can get the contents of the database openly – Note.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.