Faxploit: Hundreds of Printers Putting Businesses at Risk of Malware - HUB TechMinutes

HUB TechMinutes

Business technology news, tips and events.

HUB TechMinutes

Better business through better information.
2 minutes reading time (376 words)

Faxploit: Hundreds of Printers Putting Businesses at Risk of Malware

Faxploit: Hundreds of Printers Putting Businesses at Risk of Malware

Printers, along with every other piece of equipment that is on your network, require careful configuration and regular upkeep to ensure that they aren’t putting your data and users at risk. Security researchers recently discovered two massive vulnerabilities in HP Officejet All-in-One printers that make it incredibly easy for hackers to spread malware and gain access to a company’s network.

What You Need to Know About Faxploit

Faxploit is a series of vulnerabilities found in all models of HP Officejet All-in-One printers that allows an attacker to hijack the printer using only a fax number. Once the attacker gains control of the printer, they can elevate privileges across the network and access data or spread malware, such as notorious threats like WannaCry, Cryptowall, and more.

If your company’s fax number is listed publicly and you have an HP Officejet All-in-One printer, your network is at immediate risk. The vulnerabilities also apply to a massive list of other HP inkjet printers, including the HP Envy, HP Deskjet, HP DesignJet, HP PageWide Managed, HP PageWide Pro, HP Photosmart, HP AMP, HP Ink Tank, HP Smart Tank Wireless, and the aforementioned HP Officejet series.

It’s Strongly Recommended That Patches Are Applied

HP has released patches for these vulnerabilities and users are recommended to apply firmware updates. HUB clients who have a managed services agreement covering your network will be receiving these patches on an ongoing basis. If your business utilizes HP printers and you don’t have a managed contract or you aren’t sure if updates are being proactively applied, we strongly encourage you to immediately reach out to us to have your printers evaluated.

It’s also likely that other devices on your network may be out of date, so fully auditing your entire network for outdated firmware and missing security patches is a good idea. It’s important to remember that everything can appear to be working fine, but the doors could be wide open for threats to sneak in.

Additionally, we can help you proactively monitor and detect threats that attempt to breach your network using real-time, enterprise-level security solutions. With today’s cybersecurity landscape presenting increasingly massive threats to small businesses, doing all you can to protect your data is important. Call us today at 204-772-8822 for more information.

Technology Basics: Proxy Server
Purchasing Computers for Organizational Success

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Thursday, September 24, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.hub.ca/

Get Updates On Our New Blog Posts!

Book your free introductory consultation now.

Let's Talk

Happy Clients

Don't Miss Our Next Newsletter!

Subscribe to our free monthly newsletter! It's packed with valuable information, useful tips, and important security alerts.
* indicates required
Your email address is secure with us - we never share our subscriber information.

HUB Tech Minutes

26 September 2020
Many business’ supply chains have had a tough year. One positive outcome of this is that the innovation that was happening in that area has accelerated. Today, there are several technologies that are improving the way businesses can track all the goo...
24 September 2020
The nature of many of today’s businesses is building one product over and over and over. When you have that level of repetitiveness, it helps people find their niche, yes, but it can also result in the attention given to the task to suffer. While a d...
23 September 2020
A business’ employees are perhaps its greatest weakness in terms of its cybersecurity, although they also have the potential to be one of its greatest advantages if trained properly. To demonstrate this, let’s consider a few examples that exemplify e...