Menu
HP adds protection against firmware attacks to enterprise printers

HP adds protection against firmware attacks to enterprise printers

New security features in HP's printers can detect rogue BIOS and firmware modifications

Researchers have been demonstrating attacks against printers for years. Now, Hewlett-Packard has started building defenses directly into its printers' firmware instead of just patching individual vulnerabilities.

The company's new M506, M527 and M577 series of LaserJet Enterprise printers, set to go on sale in October and November, will have built-in detection for unauthorized BIOS and firmware modifications.

HP refers to this capability as "self-healing security," but it's actually a set of code integrity checking mechanisms that security researchers have asked embedded systems manufacturers to implement for years.

One of the new features, called HP Sure Start, validates the integrity of the BIOS code at boot time and if any modification is detected, it reboots the device and loads a clean copy. This is based on a similar feature that HP's Elite line of PCs have had since 2013.

The BIOS is the low-level software that is responsible for initializing hardware components and booting the operating system.

Another new security feature that HP calls whitelisting is an integrity checking mechanism for the FutureSmart firmware, the OS of HP LaserJet enterprise printers. It ensures that the firmware code has not been tampered with and is digitally signed by HP before loading it into memory.

Finally, the new printers also include a run-time intrusion detection system that monitors memory operations while the printers are in use and checks for signs of potential compromise. If an intrusion is detected, the device is rebooted.

The good news is that these security features can also be added to older printers. All HP LaserJet Enterprise printers that have been released since April will be able to benefit from them through a firmware update.

Older LaserJet Enterprise and OfficeJet Enterprise X printers that have been launched since 2011 will only get the whitelisting and intrusion detection mechanisms through a FutureSmart service pack update.

While HP should be commended for adding these security features, attacks against printers, including those that modify the firmware, have been known for years. Hopefully at some point these mechanisms will also be added to future consumer and small-business printer models.

In 2011, two researchers from Columbia University found that attackers could rewrite the firmware on many HP LaserJet printers with a malicious version by simply embedding the commands and code in a document sent to be printed. The attack was possible because the printers did not validate firmware updates.

The lack of digital signature verification for firmware is a problem that has plagued embedded devices for years and many devices are being still engineered today without such basic protections. Just recently, researchers discovered an ongoing attack that replaces the firmware on Cisco business-grade routers with a backdoored version.

Aside from replacing the entire firmware, attackers can also exploit vulnerabilities in individual firmware components to gain unauthorized access to a device's functions or the files stored on it.

For example, in 2009, HP issued firmware updates for several LaserJet printer models in order to fix a remotely exploitable vulnerability in their Web-based administration interface.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Slideshows

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise

Ingram Micro completed its nationwide roadshow in Auckland last month, kicking off its Innovation Hour series with Hewlett Packard Enterprise. Uncovering the latest in storage, networking and servers, the event outlined key market trends for resellers in 2016 and beyond.

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise
IN PICTURES: FireEye celebrates channel at 2016 Partner Conference

IN PICTURES: FireEye celebrates channel at 2016 Partner Conference

FireEye welcomed 143 channel partners and distributors to FireEye's 2016 annual Partner Conference, FireEye A/NZ Momentum - held at Establishment in Sydney. Delegates heard from senior trans-Tasman channel leaders, marketing and the product divisions in the morning, with FireEye customers, incident responders and threat intelligence analysts sharing knowledge during the afternoon.

IN PICTURES: FireEye celebrates channel at 2016 Partner Conference
​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​

​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​

With New Zealand businesses now open to innovation, the industry sits on the cusp of significant disruption in the data centre. Driven by software-defined networking, the future of the data centre is fast becoming reality, as the channel seeks to keep up, keep innovating and keep growing. APC by Schneider Electric, Lenovo and key partners outlined how the channel can capitalise at The Grill restaurant in Auckland.

​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​
Show Comments