CVE-2024-12510

6.7 MEDIUM

📋 TL;DR

This vulnerability in Xerox printers allows attackers with admin access to redirect LDAP authentication requests to malicious servers, potentially capturing credentials. It affects Xerox VersaLink, Phaser, and WorkCentre printers with active LDAP configurations. Attackers need administrative privileges and LDAP must be configured for exploitation.

💻 Affected Systems

Products:
  • Xerox VersaLink
  • Xerox Phaser
  • Xerox WorkCentre
Versions: Multiple firmware versions prior to the fix
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ✅ No
Notes: Requires LDAP configuration to be enabled and attacker must have administrative access to the printer's web interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator credentials are captured by redirecting LDAP authentication to a malicious server, leading to full system compromise and potential lateral movement within the network.

🟠

Likely Case

Attackers with admin access capture LDAP credentials, enabling unauthorized access to network resources and potential privilege escalation.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to credential exposure on isolated printer management interfaces.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires admin credentials and knowledge of LDAP configuration. No public exploits have been reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates specified in Xerox Security Bulletin XRX25-003

Vendor Advisory: https://securitydocs.business.xerox.com/wp-content/uploads/2025/02/Xerox-Security-Bulletin-XRX25-003-for-Xerox%C2%AE-for-VersaLinkPhaser-and-WorkCentre.pdf

Restart Required: Yes

Instructions:

1. Download the latest firmware from Xerox support portal. 2. Upload firmware via printer web interface. 3. Apply update. 4. Reboot printer.

🔧 Temporary Workarounds

Disable LDAP Authentication

all

Temporarily disable LDAP authentication if not required

Restrict Admin Access

all

Limit administrative access to printer management interfaces

🧯 If You Can't Patch

  • Segment printer management interfaces from general network traffic
  • Implement strict access controls and monitor for unauthorized admin login attempts

🔍 How to Verify

Check if Vulnerable:

Check printer firmware version against affected versions in Xerox Security Bulletin XRX25-003

Check Version:

Check printer web interface under Settings > Device Information > Firmware Version

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in the security bulletin

📡 Detection & Monitoring

Log Indicators:

  • Unusual LDAP configuration changes
  • Multiple failed admin login attempts
  • LDAP authentication requests to unexpected servers

Network Indicators:

  • LDAP traffic to non-standard servers from printer IP
  • Unexpected admin access to printer management interface

SIEM Query:

source_ip=printer_ip AND (event_type="ldap_config_change" OR dest_ip NOT IN [authorized_ldap_servers])

🔗 References

📤 Share & Export