CVE-2022-26320

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to efficiently calculate private RSA keys from public TLS certificates by exploiting weak RSA key generation in the Rambus SafeZone Basic Crypto Module. Affected devices include Fujifilm multifunction printers, Canon imagePROGRAF/imageRUNNER devices, and potentially many other embedded systems using this cryptographic module. This enables complete compromise of TLS-protected communications.

💻 Affected Systems

Products:
  • Fujifilm multifunction devices
  • Canon imagePROGRAF printers
  • Canon imageRUNNER devices
  • Other devices using Rambus SafeZone Basic Crypto Module
Versions: Rambus SafeZone Basic Crypto Module before 10.4.0
Operating Systems: Embedded firmware on affected devices
Default Config Vulnerable: ⚠️ Yes
Notes: Devices manufactured before March 2022 are likely vulnerable. The vulnerability is in the cryptographic module itself, not device configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete decryption of all TLS communications, impersonation of devices, man-in-the-middle attacks on encrypted traffic, and potential lateral movement within networks.

🟠

Likely Case

Interception and decryption of sensitive documents transmitted to/from affected printers and multifunction devices, credential theft from print jobs.

🟢

If Mitigated

Limited impact if devices are isolated from untrusted networks and TLS certificates are replaced with properly generated keys.

🌐 Internet-Facing: HIGH - Internet-facing devices with vulnerable TLS certificates can have their private keys calculated, enabling complete traffic decryption.
🏢 Internal Only: HIGH - Internal devices can still be exploited by attackers who gain network access, allowing interception of sensitive internal communications.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Fermat's factorization method is well-known and efficient for vulnerable keys. Attack requires only the public certificate, no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Rambus SafeZone Basic Crypto Module 10.4.0 or later

Vendor Advisory: https://www.rambus.com/security/response-center/advisories/rmbs-2021-01/

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply firmware update from Canon/Fujifilm. 3. Regenerate all TLS certificates using updated cryptographic module. 4. Restart affected devices.

🔧 Temporary Workarounds

Network segmentation

all

Isolate affected devices from untrusted networks and limit communication to necessary services only.

Certificate replacement

all

Replace TLS certificates with ones generated by secure systems (not using vulnerable module).

🧯 If You Can't Patch

  • Replace affected devices with updated models
  • Implement network-level encryption (VPN/IPsec) for all communications with affected devices

🔍 How to Verify

Check if Vulnerable:

Extract public certificate from device, check if RSA key is vulnerable to Fermat factorization using tools from fermatattack.secvuln.info

Check Version:

Check device web interface or manufacturer documentation for firmware version

Verify Fix Applied:

Verify firmware version is updated and new certificates show proper key generation (not vulnerable to Fermat attack)

📡 Detection & Monitoring

Log Indicators:

  • Unusual certificate validation failures
  • Multiple TLS handshake failures

Network Indicators:

  • Unexpected certificate changes
  • Man-in-the-middle attack patterns on printer/device traffic

SIEM Query:

tls.handshake AND (device_type:printer OR device_type:mfp) AND certificate.algorithm:RSA

🔗 References

📤 Share & Export