Name: Fax Vulnerability Affecting HP Printers Tracking Number 2018-002 First Publish Date 15-Aug-18 Date of Current Status 15-Aug-18 Next Planned Update 20-Aug-18 Description Embedded fax may be vulnerable to remote code execution flaws What you need to know? Check Point Research were able to gain access using a phone line to send a fax that […]
Xerox recommends the following to help protect your Xerox device: Don’t connect your Xerox device directly to the public Internet. Make sure it’s behind a firewall or router so that only you and your users have access to it. This helps keep outsiders from accessing the machine and interrupting your business. Change default passwords on […]
Name: Name Spectre & Meltdown CPU Vulnerabilities Tracking Number 2018-001 First Publish Date 5-Jan-2018 Date of Current Status 29-Mar-2018 Description Vulnerabilities in select CPU vendors potentially could allow access to protected memory. What You Need to Know? Security researchers reported flaws in CPUs that may allow an attacker with local user access the ability […]
Name Xerox AltaLink Devices Achieve Common Criteria Certification Tracking Number 2017-015 Publish Date 8-Dec-17 Announcement On November 20, 2017, the AltaLink B8000 Series and AltaLink C8000 Series received National Information Assurance Partnership’s (NIAP) certification against the latest Common Criteria security protection profile for hardcopy devices. Xerox ConnectKey Technology-enabled AltaLink devices are the first multifunction printers […]
A researcher released a description and proof of concept code that takes advantage of a previously-unknown flaw in WPA2.
A recent Distributed Denial of Service (DDOS) attack has been attributed to the Mirai botnet.
Recently researchers in Germany published a paper describing a number of vulnerabilities in the PostScript printer language.
Some Xerox printers may begin printing pages filled with the letter ‘X’ when scanned by the Qualys network vulnerability scanning tool.
WannaCry and Petya are malware that attack unpatched Windows systems, encrypt the files and demand a ransom to decrypt them.