CVE-2018-20768

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary PHP code on affected Xerox multifunction printers by exploiting a writable file. Attackers can achieve remote code execution with high privileges, potentially taking full control of the device. All listed Xerox WorkCentre and ConnectKey devices running vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • Xerox WorkCentre 3655
  • Xerox WorkCentre 3655i
  • Xerox WorkCentre 58XX
  • Xerox WorkCentre 58XXi
  • Xerox WorkCentre 59XX
  • Xerox WorkCentre 59XXi
  • Xerox WorkCentre 6655
  • Xerox WorkCentre 6655i
  • Xerox WorkCentre 72XX
  • Xerox WorkCentre 72XXi
  • Xerox WorkCentre 78XX
  • Xerox WorkCentre 78XXi
  • Xerox WorkCentre 7970
  • Xerox WorkCentre 7970i
  • Xerox ConnectKey EC7836
  • Xerox ConnectKey EC7856
Versions: All versions before R18-05 073.xxx.0487.15000
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with default configurations are vulnerable. The vulnerability requires network access to the printer's web interface or services.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the printer device, allowing attackers to steal scanned documents, intercept print jobs, pivot to internal networks, install persistent malware, or use the device as a foothold for further attacks.

🟠

Likely Case

Remote code execution leading to data exfiltration, device takeover for malicious activities like cryptomining, or disruption of printing services.

🟢

If Mitigated

Limited impact if devices are isolated from internet, have strict network controls, and are monitored for suspicious activity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows PHP code execution through a writable file, which typically requires minimal technical skill to exploit once the attack vector is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R18-05 073.xxx.0487.15000 or later

Vendor Advisory: https://securitydocs.business.xerox.com/wp-content/uploads/2018/07/cert_Security_Mini_Bulletin_XRX18Y_for_ConnectKey_EC78xx_v1.0.pdf

Restart Required: Yes

Instructions:

1. Download the firmware update from Xerox support portal. 2. Upload the firmware file through the printer's web interface. 3. Apply the update and restart the device. 4. Verify the firmware version after restart.

🔧 Temporary Workarounds

Network segmentation

all

Isolate printers from untrusted networks and restrict access to necessary services only.

Disable unnecessary services

all

Turn off web interface, FTP, or other services not required for operation.

🧯 If You Can't Patch

  • Segment printers on isolated VLANs with strict firewall rules
  • Implement network monitoring for suspicious traffic to/from printers

🔍 How to Verify

Check if Vulnerable:

Access printer web interface, navigate to Settings > Properties > About, check firmware version.

Check Version:

Not applicable - use web interface or device display

Verify Fix Applied:

Verify firmware version is R18-05 073.xxx.0487.15000 or later in the About section.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations in PHP directories
  • Unexpected PHP process execution
  • Unauthorized configuration changes

Network Indicators:

  • Unusual HTTP POST requests to printer web interface
  • Suspicious file uploads to printer services
  • Unexpected outbound connections from printer

SIEM Query:

source="printer_logs" AND (event="file_write" OR event="php_execution")

🔗 References

📤 Share & Export