V1.0
Xerox® Phaser® 3635MFP
V1.0
Xerox® Phaser® 3635MFP
Products Affected by SHA-1 Certificate Expiration Available Options for Continuing Remote Services
V1.0
Xerox® Phaser® 3635MFP
SPAR Release 20.107.11.000
V1.0
Xerox® Phaser® 3635MFP
Xerox® Phaser® 3635 Multifunction Printer General Release 20.107.01.000
Contains fix for CVE 2016-2177, CVE-2016-2183 (Sweet32) and CVE-2015-2808 (Bar Mitzvah) on Phaser 3635MFP.
General release for Phaser 3635 MFP, contains fixes for many vulnerabilities.
This software contains fix for Logjam and VxWorks TCP Sequence vulnerabilities on Phaser 3635MFp.
This bulletin and the software upgrade for the Phaser 3635MFP, fix the OpenSSL Poodle and Freak vulnerabilities.
NOTE: We are re-issuing this bulletin due to a spelling error of the name of one of the researchers. No technical content in the bulletin has changed.
Vulnerabilities exist that, if exploited, could allow remote attackers to insert arbitrary code into the device. This could occur with a specifically crafted Postscript or firmware job submitted to the device. If successful, an attacker could make unauthorized changes to the system configuration; however, customer and user passwords are not exposed.
As part of Xerox’s on-going efforts to protect customers, the ability to accept these specially crafted jobs can be disabled for the affected products listed in the bulletin. Links for the software needed are contained inside the bulletin.
This document has been created to detail the security settings available to customers on Xerox Multifunction devices that may not have their own specific Secure Installation and Operation document.
NOTE: Not all products will support all the security features detailed in this document.