CVE-2021-28673
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary commands on affected Xerox multifunction printers via a weaponized clone file in the Web User Interface. Attackers can gain full control of the device without authentication. Affected systems include numerous Xerox Phaser, WorkCentre, and VersaLink models with specific firmware versions.
💻 Affected Systems
- Xerox Phaser 6510
- Xerox WorkCentre 6515
- Xerox VersaLink B400
- Xerox VersaLink B405
- Xerox VersaLink B600/B610
- Xerox VersaLink B605/B615
- Xerox VersaLink B7025/30/35
- Xerox VersaLink C400
- Xerox VersaLink C405
- Xerox VersaLink C500/C600
- Xerox VersaLink C505/C605
- Xerox VersaLink C7000
- Xerox VersaLink C7020/25/30
- Xerox VersaLink C8000/C9000
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the printer allowing attackers to execute arbitrary commands, potentially leading to lateral movement into the network, data exfiltration, or deployment of persistent malware.
Likely Case
Attackers gain control of the printer to use it as a foothold for network reconnaissance, credential harvesting, or launching attacks against other internal systems.
If Mitigated
With proper network segmentation and access controls, impact is limited to the printer itself, though it could still be used for denial of service or local data compromise.
🎯 Exploit Status
The vulnerability requires a weaponized clone file but no authentication. Attack complexity is low once the exploit method is known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: See specific fixed versions in CVE description (e.g., Phaser 6510 version 64.61.23 or 64.59.11)
Restart Required: Yes
Instructions:
1. Identify affected printer models and current firmware versions. 2. Download appropriate firmware updates from Xerox support portal. 3. Apply firmware update following manufacturer instructions. 4. Reboot printer after update completion. 5. Verify new firmware version is installed.
🔧 Temporary Workarounds
Disable Web UI Access
allDisable remote access to the printer's web interface to prevent exploitation
Network Segmentation
allPlace printers on isolated network segments with strict firewall rules
🧯 If You Can't Patch
- Isolate affected printers from internet and critical internal networks using VLANs and firewall rules
- Disable all unnecessary services and interfaces on the printers
🔍 How to Verify
Check if Vulnerable:
Check printer firmware version via web interface or device display against affected version ranges in CVE description
Check Version:
Access printer web interface at http://[printer-ip]/ or check device display for firmware version
Verify Fix Applied:
Verify firmware version has been updated to patched versions specified in vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to printer web interface
- Unexpected command execution events
- Multiple failed authentication attempts followed by successful access
Network Indicators:
- Unusual outbound connections from printer to external IPs
- Suspicious HTTP requests to printer web interface from unexpected sources
SIEM Query:
source="printer_logs" AND (event="file_upload" OR event="command_execution")
🔗 References
- https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf
- https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf