CVE-2013-6362

9.8 CRITICAL

📋 TL;DR

Xerox ColorCube and WorkCenter devices from 2013 contained hardcoded FTP and shell user accounts with known credentials. This allows attackers to gain unauthorized access to these devices, potentially compromising the entire network. Organizations using affected Xerox multifunction printers are vulnerable.

💻 Affected Systems

Products:
  • Xerox ColorCube
  • Xerox WorkCenter
Versions: 2013 models and firmware versions
Operating Systems: Embedded printer OS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with default configurations are vulnerable. The hardcoded accounts cannot be removed or disabled without firmware updates.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to data exfiltration, lateral movement into corporate networks, installation of persistent malware, and use as attack launch points.

🟠

Likely Case

Unauthorized access to device configuration, document interception, credential harvesting, and potential foothold for further network attacks.

🟢

If Mitigated

Limited to device compromise only if network segmentation prevents lateral movement and monitoring detects unauthorized access attempts.

🌐 Internet-Facing: HIGH - Devices exposed to internet can be directly attacked using known credentials without authentication.
🏢 Internal Only: HIGH - Internal attackers or malware can exploit these credentials to gain device access and potentially move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attackers only need to know the hardcoded credentials which have been publicly documented. No special tools or skills required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates from Xerox that remove hardcoded accounts

Vendor Advisory: https://www.xerox.com/support/security/advisory

Restart Required: Yes

Instructions:

1. Check Xerox security advisory for affected models. 2. Download latest firmware from Xerox support portal. 3. Upload firmware to device via web interface. 4. Reboot device after installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate printer devices on separate VLAN with strict firewall rules preventing outbound connections

Access Control Lists

all

Implement IP-based restrictions to only allow management from authorized administrative networks

🧯 If You Can't Patch

  • Remove affected devices from network or place behind strict firewall with no internet access
  • Implement continuous monitoring for FTP and SSH connections to printer devices

🔍 How to Verify

Check if Vulnerable:

Attempt FTP or SSH connection to device using documented hardcoded credentials from security advisories

Check Version:

Check device web interface under Settings > System > About or use SNMP query

Verify Fix Applied:

Verify firmware version matches patched version from Xerox advisory and test that hardcoded credentials no longer work

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login
  • FTP or SSH connections from unexpected IP addresses
  • Configuration changes outside maintenance windows

Network Indicators:

  • FTP/SSH traffic to printer devices from non-admin networks
  • Unexpected outbound connections from printer devices

SIEM Query:

source_ip IN (printer_ips) AND (protocol='ftp' OR protocol='ssh') AND NOT source_ip IN (admin_networks)

🔗 References

📤 Share & Export