CVE-2021-20679

7.5 HIGH

📋 TL;DR

This vulnerability in Fuji Xerox multifunction devices and printers allows attackers to send specially crafted commands that cause denial of service (DoS) conditions and abnormal termination (ABEND) of affected devices. The attack disrupts printing, scanning, and other device functions, affecting organizations using these specific Fuji Xerox models.

💻 Affected Systems

Products:
  • Fuji Xerox DocuCentre-VII C7773/C6673/C5573/C4473/C3373/C3372/C2273
  • DocuCentre-VII C7788/C6688/C5588
  • ApeosPort-VII C7773/C6673/C5573/C4473/C3373/C3372 C2273
  • ApeosPort-VII C7788/C6688/C5588
  • ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/C7070G/C6570G/C5570G/C4570G/C3570G/C3070G
  • ApeosPort-VII C4421/C3321
  • ApeosPort C3060/C2560/C2060/C3060G/C2560G/C2060G
  • ApeosPort-VII CP4421
  • ApeosPort Print C5570
  • ApeosPort 5570/4570/5570G/4570G
  • ApeosPort 3560/3060/2560/3560G/3060G/2560G
  • ApeosPort-VII 5021/4021
  • ApeosPort-VII P5021
  • DocuPrint CP 555 d/505 d
  • DocuPrint P505 d
  • PrimeLink C9065/C9070
  • DocuPrint CP475AP
  • DocuPrint P475AP
Versions: All firmware versions prior to fixes released in March 2021
Operating Systems: Embedded firmware on affected devices
Default Config Vulnerable: ⚠️ Yes
Notes: All affected models in default configuration are vulnerable. No specific configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device unavailability requiring physical restart, disrupting all printing/scanning operations and potentially affecting business continuity.

🟠

Likely Case

Temporary service disruption requiring device reboot, causing printing delays and workflow interruptions.

🟢

If Mitigated

Minimal impact if devices are network-segmented and not internet-facing, with quick recovery via reboot.

🌐 Internet-Facing: HIGH - Internet-facing devices are directly exploitable by remote attackers without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this, but requires network access to devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires sending specially crafted commands to device network services. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates released March 2021

Vendor Advisory: https://www.fujixerox.co.jp/company/news/notice/2021/0319_announce.html

Restart Required: Yes

Instructions:

1. Identify affected device models. 2. Download firmware updates from Fuji Xerox support portal. 3. Apply firmware updates following vendor instructions. 4. Reboot devices after update completion.

🔧 Temporary Workarounds

Network segmentation

all

Isolate affected devices from untrusted networks and internet access

Access control lists

all

Implement network ACLs to restrict access to device management interfaces

🧯 If You Can't Patch

  • Segment devices on isolated network VLANs with strict access controls
  • Implement monitoring for abnormal device restarts and network traffic to device ports

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or device display against vendor advisory

Check Version:

Access device web interface at http://[device-ip]/ or check device display menu for firmware version

Verify Fix Applied:

Verify firmware version matches patched versions listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Abnormal termination logs in device system logs
  • Failed service messages

Network Indicators:

  • Unusual traffic patterns to device management ports
  • Multiple connection attempts to device services

SIEM Query:

source="network_device" AND (event_type="reboot" OR event_type="crash") AND device_vendor="Fuji Xerox"

🔗 References

📤 Share & Export