Products Affected by SHA-1 Certificate Expiration Available Options for Continuing Remote Services
WorkCentre 232/238
Security Bulletins for Xerox Products (13)
Xerox Security Bulletin XRX12-005 V1.1 (PDF 103.3K)
The Xerox devices ColorQube® 9201/9202/9203, ColorQube® 9301/9302/9303, WorkCentre® 232/238/245/255/265/275, WorkCentre® 5030/5050, WorkCentre® 5135/5150, WorkCentre® 5632/5638/5645/5655/5665/5675/5687, WorkCentre® 5735/5740/5745/5755/5765/5775/5790, WorkCentre® 6400, WorkCentre® 7525/7530/7535/7545/7556, WorkCentre® 7655/7665/7675, WorkCentre® 7755/7765/7775, WorkCentre® Bookmark 40/55, WorkCentre Pro® 232/238/245/255/265/275 were shipped with certain protocols enabled that, if properly exploited, could be used to gain unauthorized access to the system. These particular protocols should not have been present in the production configuration and need to be removed from that configuration to minimize the possibility of unauthorized system access.
A software solution (patch P49) is provided for the products listed. This solution will remove from the production configuration the unwanted protocols in question so they can’t be exploited to gain unauthorized access to the system.
This solution is designed to be installed by the customer. The software solution is compressed into a 3 KB zip file and can be accessed via the link below or via the link following this bulletin announcement on the Xerox Security Site.
Software available through this link:
cert_P49v1_Patch2.zip
Xerox Security Bulletin XRX12-003 v1.1 (PDF 185.5K)
NOTE: We are re-issuing this bulletin due to a spelling error of the name of one of the researchers. No technical content in the bulletin has changed.
Vulnerabilities exist that, if exploited, could allow remote attackers to insert arbitrary code into the device. This could occur with a specifically crafted Postscript or firmware job submitted to the device. If successful, an attacker could make unauthorized changes to the system configuration; however, customer and user passwords are not exposed.
As part of Xerox’s on-going efforts to protect customers, the ability to accept these specially crafted jobs can be disabled for the affected products listed in the bulletin. Links for the software needed are contained inside the bulletin.
Xerox Security Bulletin XRX09-001 (PDF 74.2K)
A command injection vulnerability exists in the web server of the WorkCentre/WorkCentre Pro 232/238/245/255/265/275 and the WorkCentre 5632/5638/5645/5655/5665/5675/5687. If exploited, the vulnerability could allow remote attackers to execute arbitrary code via carefully crafted inputs on the affected web page. Customer and user passwords are not exposed.
cert_P37v1_WCP275_WC5687_Patch.zip
Xerox Security Bulletin XRX08-009 (PDF 104.4K)
A vulnerability exists in the WorkCentre Pro 232/238/245/255/265/275, WorkCentre 232/238/245/255/265/275, WorkCentre 7655/7665/7675, and WorkCentre 5632/5638/5645/5655/5665/5675/5687 ESS/Network Controller that, if exploited, could allow remote attackers to execute arbitrary code via specially crafted Remove Service Message Block (SMB) responses. This could occur with buffer overflows and un-validated user input in the Samba third-party code that handles file and printer sharing services for SMB clients (including Xerox MFD devices).
If successful, an attacker could make unauthorized changes to the system configuration; however, customer and user passwords are not exposed. This vulnerability affects only the printer sharing services.
cert_P36v2_WCP275_WC7675_WC5687_Patch.zip
Xerox Security Bulletin XRX08-001 (PDF 40.6K)
Vulnerabilities exist in the WorkCentre 232/238/245/255/265/275, WorkCentre Pro 232/238/245/255/265/275, and WorkCentre 7655/7665 ESS/Network Controller that, if exploited, could allow remote attackers to execute arbitrary code via specially crafted Remote Procedure Call (RPC) requests.
cert_P32v2_WCP275_WC7665_Patch.zip
Xerox Security Bulletin XRX06-005 (PDF 144K)
Vulnerability in the ESS / Network Controller and MicroServer Web Server could allow remote execution of arbitrary software.
This bulletin been superseded by XRX07-002. Download Permanently Unavailable
Xerox Security Bulletin XRX07-002 (PDF 42.5K)
A command injection vulnerability exists in the WorkCentre 232/238/245/255/265/275, WorkCentre Pro 232/238/245/255/265/275, and WorkCentre 7655/7665 ESS/ Network Controller and MicroServer Web Server. If exploited, this vulnerability could allow remote execution of arbitrary software.
cert_P31v14_ESS_Network_Controller_CP_Patch.zip
Xerox Security Bulletin XRX07-001 (PDF 43.7K)
A command injection vulnerability exists in the WorkCentre 232/238/245/255/265/275, WorkCentre Pro 232/238/245/255/265/275, and WorkCentre 7655/7665 ESS/ Network Controller that, if exploited, could allow remote execution of arbitrary software, forgery of digital certificates, or initiation of Denial of Service attacks.
cert_P30_ESS_Network_Controller_Patch.zip
Xerox Security Bulletin XRX06-003 (PDF 19.7K)
Cumulative update for Common Criteria Assurance Maintenance.
Note: This bulletin has been superseded by XRX06-006.
Xerox Security Bulletin XRX06-006 (PDF 31.8K)
Cumulative update to address multiple security vulnerabilities.
Xerox Security Bulletin XRX06-004 (PDF 47.4K)
Cumulative update to address multiple security vulnerabilities.
Xerox Security Bulletin XRX06-001 (PDF 37.4K)
Vulnerabilities in the ESS/ Network Controller and MicroServer Web Server could potentially permit unauthorized access.
Note: This bulletin has been superseded by XRX06-003.