CVE-2019-13168
📋 TL;DR
A buffer overflow vulnerability in the IPP service of certain Xerox printers allows unauthenticated attackers to cause denial of service or potentially execute arbitrary code. This affects Xerox printers like the Phaser 3320 with vulnerable firmware versions. Organizations using affected printers are at risk.
💻 Affected Systems
- Xerox Phaser 3320
- Other Xerox printer models with similar firmware
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, lateral movement to connected networks, and persistent backdoor installation.
Likely Case
Denial of service causing printer downtime and disruption of printing services.
If Mitigated
Limited to denial of service with no code execution if memory protections are enabled.
🎯 Exploit Status
Buffer overflow in IPP attributes parser requires crafting malicious IPP packets. Public technical details available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware versions after V53.006.16.000
Vendor Advisory: https://security.business.xerox.com/
Restart Required: Yes
Instructions:
1. Check current firmware version via printer web interface. 2. Download latest firmware from Xerox support site. 3. Upload firmware via printer web interface. 4. Reboot printer after installation.
🔧 Temporary Workarounds
Disable IPP Service
allTurn off Internet Printing Protocol service to block exploitation vector.
Access printer web interface > Network/Protocols > Disable IPP
Network Segmentation
allIsolate printers to separate VLAN with restricted access.
Configure firewall rules to block external access to printer IPP port 631
🧯 If You Can't Patch
- Implement strict network access controls to limit printer access to trusted IPs only.
- Monitor network traffic to printer port 631 for anomalous IPP packets.
🔍 How to Verify
Check if Vulnerable:
Check firmware version via printer web interface or display panel. Compare against vulnerable version V53.006.16.000.
Check Version:
Access printer web interface at http://[printer-ip]/ and navigate to Settings > Device Information
Verify Fix Applied:
Confirm firmware version is updated beyond V53.006.16.000 and test IPP service functionality.
📡 Detection & Monitoring
Log Indicators:
- Printer crash logs
- IPP service restart events
- Memory error messages in system logs
Network Indicators:
- Unusual traffic to port 631
- Malformed IPP packets
- Multiple connection attempts from single source
SIEM Query:
source="printer_logs" AND ("crash" OR "buffer" OR "IPP") OR dest_port=631 AND packet_size>normal