CVE-2018-20770

9.8 CRITICAL

📋 TL;DR

This CVE describes a blind SQL injection vulnerability in multiple Xerox WorkCentre and ConnectKey devices. Attackers can execute arbitrary SQL commands without authentication, potentially compromising device security and data. Affected users include organizations using vulnerable Xerox multifunction printers.

💻 Affected Systems

Products:
  • Xerox WorkCentre 3655
  • Xerox WorkCentre 3655i
  • Xerox WorkCentre 58XX
  • Xerox WorkCentre 58XXi
  • Xerox WorkCentre 59XX
  • Xerox WorkCentre 59XXi
  • Xerox WorkCentre 6655
  • Xerox WorkCentre 6655i
  • Xerox WorkCentre 72XX
  • Xerox WorkCentre 72XXi
  • Xerox WorkCentre 78XX
  • Xerox WorkCentre 78XXi
  • Xerox WorkCentre 7970
  • Xerox WorkCentre 7970i
  • Xerox ConnectKey EC7836
  • Xerox ConnectKey EC7856
Versions: All versions before R18-05 073.xxx.0487.15000
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected devices in default configuration are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to data exfiltration, lateral movement to connected networks, and persistent backdoor installation.

🟠

Likely Case

Unauthorized access to device configuration, sensitive document data, and potential credential harvesting from device databases.

🟢

If Mitigated

Limited impact if devices are isolated from critical networks and have restricted administrative access.

🌐 Internet-Facing: HIGH - Devices exposed to internet are directly exploitable without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this to pivot within networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Blind SQL injection typically requires some trial and error but is well-understood by attackers. No authentication required makes exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R18-05 073.xxx.0487.15000 or later

Vendor Advisory: https://securitydocs.business.xerox.com/wp-content/uploads/2018/07/cert_Security_Mini_Bulletin_XRX18Y_for_ConnectKey_EC78xx_v1.0.pdf

Restart Required: Yes

Instructions:

1. Log into device web interface as administrator. 2. Navigate to Settings > System > Updates. 3. Check for available firmware updates. 4. Download and install R18-05 073.xxx.0487.15000 or later. 5. Reboot device after installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate vulnerable printers on separate VLAN with restricted access

Access Control Lists

all

Implement firewall rules to restrict access to printer management interfaces

🧯 If You Can't Patch

  • Disable remote management interfaces if not required
  • Implement strict network segmentation to isolate printers from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface: Settings > System > About. Compare version against vulnerable range.

Check Version:

No CLI command. Use web interface: http://[printer-ip]/web/guest/en/websys/webArch/getStatus.cgi

Verify Fix Applied:

Confirm firmware version is R18-05 073.xxx.0487.15000 or later in device settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in device logs
  • Multiple failed authentication attempts followed by SQL-like queries
  • Unexpected configuration changes

Network Indicators:

  • Unusual HTTP POST requests to device management endpoints
  • SQL injection patterns in HTTP traffic to printer IPs
  • Outbound connections from printers to unexpected destinations

SIEM Query:

source="printer_logs" AND ("sql" OR "injection" OR "syntax error") OR dest_ip="printer_ips" AND http_method="POST" AND (url_contains="config" OR url_contains="admin")

🔗 References

📤 Share & Export