CVE-2022-25342
📋 TL;DR
This CVE describes a broken access control vulnerability in Olivetti d-COLOR MF3555 multifunction printers. Attackers can bypass authentication and access restricted administrative pages via the /mngset/authset path. Only users of affected Olivetti printer models are impacted.
💻 Affected Systems
- Olivetti d-COLOR MF3555
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker gains full administrative control of the printer, potentially accessing sensitive documents, modifying device settings, or using the device as an internal network foothold.
Likely Case
Unauthorized access to printer configuration pages, exposure of network settings, and potential access to document history or scanning functions.
If Mitigated
Limited exposure if network segmentation prevents external access and proper authentication controls are implemented.
🎯 Exploit Status
The vulnerability appears to be a simple path traversal/access control bypass requiring no authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.gruppotim.it/it/footer/red-team.html
Restart Required: No
Instructions:
Check vendor advisory for firmware updates. If available, download and install via printer web interface or management software.
🔧 Temporary Workarounds
Network Segmentation
allIsolate printer network segment to prevent external access
Access Control Lists
allImplement firewall rules to restrict access to printer management interface
🧯 If You Can't Patch
- Disable web management interface if not required
- Implement strict network segmentation to limit printer access to authorized management stations only
🔍 How to Verify
Check if Vulnerable:
Access printer web interface and attempt to navigate to /mngset/authset without authentication. If accessible, device is vulnerable.
Check Version:
Check printer web interface System Information page or printed configuration report for firmware version.
Verify Fix Applied:
After applying any firmware update, verify that /mngset/authset path requires proper authentication.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to /mngset/authset path in web server logs
- Multiple failed authentication attempts followed by successful access to restricted paths
Network Indicators:
- HTTP requests to /mngset/authset without preceding authentication requests
- Unusual traffic patterns to printer management interface
SIEM Query:
source="printer_logs" AND (uri_path="/mngset/authset" OR status_code=200 AND uri_path CONTAINS "authset")