CVE-2024-12511

7.6 HIGH

📋 TL;DR

This vulnerability allows attackers with address book access to modify SMB/FTP settings on affected Xerox printers, potentially redirecting scans and capturing credentials. It requires enabled scan functions and printer access. Affects Xerox VersaLink, Phaser, and WorkCentre multifunction printers.

💻 Affected Systems

Products:
  • Xerox VersaLink
  • Xerox Phaser
  • Xerox WorkCentre
Versions: Specific versions not detailed in bulletin; all versions before patch
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires enabled scan functions and address book access capability

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers capture administrative credentials, gain persistent access to network resources, and potentially move laterally within the network.

🟠

Likely Case

Unauthorized modification of scan destinations leading to data exfiltration or credential harvesting from scan jobs.

🟢

If Mitigated

Limited to authorized users with address book access, reducing exposure to internal threats only.

🌐 Internet-Facing: LOW (requires internal network access and specific printer configuration)
🏢 Internal Only: MEDIUM (requires address book access and enabled scan functions)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to address book functionality and knowledge of printer configuration

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates as specified in Xerox Security Bulletin XRX25-003

Vendor Advisory: https://securitydocs.business.xerox.com/wp-content/uploads/2025/02/Xerox-Security-Bulletin-XRX25-003-for-Xerox%C2%AE-for-VersaLinkPhaser-and-WorkCentre.pdf

Restart Required: No

Instructions:

1. Download latest firmware from Xerox support portal. 2. Upload firmware to printer via web interface. 3. Apply update through printer maintenance menu.

🔧 Temporary Workarounds

Disable address book access

all

Restrict or disable address book functionality for non-administrative users

Disable scan-to-network functions

all

Turn off SMB/FTP scan capabilities if not required

🧯 If You Can't Patch

  • Implement network segmentation to isolate printers from sensitive systems
  • Enable detailed logging of printer configuration changes and scan activities

🔍 How to Verify

Check if Vulnerable:

Check printer firmware version against patched versions in Xerox bulletin

Check Version:

Check via printer web interface: Settings > Device Information > Firmware Version

Verify Fix Applied:

Verify firmware version matches or exceeds patched version in security bulletin

📡 Detection & Monitoring

Log Indicators:

  • Unexpected SMB/FTP configuration changes
  • Scan jobs sent to unfamiliar destinations
  • Multiple failed authentication attempts to printer

Network Indicators:

  • Unusual SMB/FTP traffic from printers
  • Scan data sent to unexpected IP addresses

SIEM Query:

source="printer_logs" AND (event="configuration_change" OR event="scan_completed") AND dest_ip NOT IN [approved_destinations]

🔗 References

📤 Share & Export