CVE-2021-28669

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthorized users to modify configuration settings on affected Xerox multifunction printers without administrative privileges. It affects specific Xerox AltaLink and C80 series models running outdated firmware versions. Attackers could potentially alter device settings to compromise security or functionality.

💻 Affected Systems

Products:
  • Xerox AltaLink B80xx
  • Xerox C8030
  • Xerox C8035
  • Xerox C8045
  • Xerox C8055
  • Xerox C8070
Versions: AltaLink B80xx: before 103.008.020.23120; C8030/C8035: before 103.001.020.23120; C8045/C8055: before 103.002.020.23120; C8070: before 103.003.020.23120
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected models with default configurations are vulnerable until patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could reconfigure the printer to disable security features, intercept print jobs, or establish persistent access to the network through the compromised device.

🟠

Likely Case

Unauthorized users could change printer settings like network configurations, security policies, or access controls, potentially disrupting operations or exposing sensitive information.

🟢

If Mitigated

With proper network segmentation and access controls, the impact would be limited to printer functionality without broader network compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the printer's management interface but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AltaLink B80xx: 103.008.020.23120 or later; C8030/C8035: 103.001.020.23120 or later; C8045/C8055: 103.002.020.23120 or later; C8070: 103.003.020.23120 or later

Vendor Advisory: https://securitydocs.business.xerox.com/wp-content/uploads/2020/09/cert_Security_Mini_Bulletin_XRX20R_for_ALB80xx-C80xx-2.pdf

Restart Required: Yes

Instructions:

1. Download the appropriate firmware update from Xerox support portal. 2. Upload the firmware file to the printer via web interface or USB. 3. Follow on-screen prompts to complete installation. 4. Reboot the printer after update completes.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to printer management interfaces to authorized administrative networks only.

Disable Unnecessary Services

all

Disable any unnecessary network services on the printer to reduce attack surface.

🧯 If You Can't Patch

  • Isolate affected printers on separate VLAN with strict firewall rules
  • Implement network monitoring for unauthorized configuration changes

🔍 How to Verify

Check if Vulnerable:

Access printer web interface > System > About and compare firmware version against patched versions listed in affected systems.

Check Version:

Not applicable - check via printer web interface or display panel

Verify Fix Applied:

Confirm firmware version matches or exceeds patched version listed in fix_official section.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized configuration changes in printer logs
  • Multiple failed authentication attempts followed by configuration changes

Network Indicators:

  • Unusual network traffic to printer management ports from non-admin IPs
  • Configuration changes via non-standard protocols

SIEM Query:

source="printer_logs" AND (event="configuration_change" OR event="settings_modified") AND user!="admin"

🔗 References

📤 Share & Export