CVE-2021-28671

9.8 CRITICAL

📋 TL;DR

This CVE describes a remote command execution vulnerability in Xerox multifunction printers' web interface. Attackers can execute arbitrary commands on affected devices using a weaponized clone file. All listed Xerox printer models with vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • Xerox Phaser 6510
  • WorkCentre 6515
  • VersaLink B400
  • VersaLink B405
  • VersaLink B600/B610
  • VersaLink B605/B615
  • VersaLink B7025/30/35
  • VersaLink C400
  • VersaLink C405
  • VersaLink C500/C600
  • VersaLink C505/C605
  • VersaLink C7000
  • VersaLink C7020/25/30
  • VersaLink C8000/C9000
  • VersaLink C8000W
Versions: Bridge firmware versions before specified patches (e.g., Phaser 6510 before 64.65.51 and 64.59.11)
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web user interface component. All affected models with default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attackers to install persistent malware, steal sensitive documents, pivot to internal networks, or use devices as part of botnets.

🟠

Likely Case

Data exfiltration from scanned documents, device disruption, or use as internal network foothold for further attacks.

🟢

If Mitigated

Limited impact if devices are isolated, web interface disabled, and network access restricted.

🌐 Internet-Facing: HIGH - Web interface accessible from internet allows remote exploitation without authentication.
🏢 Internal Only: HIGH - Even internally, vulnerable devices can be exploited by attackers who gain network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vendor advisory mentions 'weaponized clone file' indicating known exploitation methods exist. No authentication required for web interface exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Bridge firmware versions: Phaser 6510 64.65.51/64.59.11, WorkCentre 6515 65.65.51/65.59.11, VersaLink B400 37.65.51/37.59.01, etc. (see advisory for complete list)

Vendor Advisory: https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf

Restart Required: Yes

Instructions:

1. Download firmware update from Xerox support portal. 2. Upload firmware via printer web interface. 3. Apply update. 4. Reboot printer. 5. Verify firmware version.

🔧 Temporary Workarounds

Disable Web Interface

all

Disable the web user interface to prevent remote exploitation.

Access printer settings > Network/Protocols > HTTP/HTTPS > Disable

Network Segmentation

all

Isolate printers on separate VLAN with restricted access.

🧯 If You Can't Patch

  • Disable web interface completely
  • Implement strict network ACLs to allow only necessary IPs to access printer management interface

🔍 How to Verify

Check if Vulnerable:

Check firmware version via printer web interface: Settings > Device Information > Firmware Version

Check Version:

Navigate to printer IP in browser and check firmware version in device information page

Verify Fix Applied:

Verify firmware version matches or exceeds patched versions listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual web interface access patterns
  • Unexpected firmware modification attempts
  • Suspicious command execution in system logs

Network Indicators:

  • Unusual outbound connections from printers
  • HTTP requests to printer web interface from unexpected sources
  • Traffic patterns suggesting exploitation

SIEM Query:

source="printer_logs" AND (event="firmware_update" OR event="web_interface_access" OR event="command_execution")

🔗 References

📤 Share & Export