The Xerox devices ColorQubeÂ® 9201/9202/9203, ColorQubeÂ® 9301/9302/9303, WorkCentreÂ® 232/238/245/255/265/275, WorkCentreÂ® 5030/5050, WorkCentreÂ® 5135/5150, WorkCentreÂ® 5632/5638/5645/5655/5665/5675/5687, WorkCentreÂ® 5735/5740/5745/5755/5765/5775/5790, WorkCentreÂ® 6400, WorkCentreÂ® 7525/7530/7535/7545/7556, WorkCentreÂ® 7655/7665/7675, WorkCentreÂ® 7755/7765/7775, WorkCentreÂ® Bookmark 40/55, WorkCentre ProÂ® 232/238/245/255/265/275 were shipped with certain protocols enabled that, if properly exploited, could be used to gain
unauthorized access to the system. These particular protocols should not have been present in the production configuration and need to be removed from that configuration to minimize the possibility of unauthorized system access.
A software solution (patch P49) is provided for the products listed. This solution will remove from the production configuration the unwanted protocols in question so they canâ€™t be exploited to gain unauthorized access to the system.
This solution is designed to be installed by the customer. The software solution is compressed into a 3 KB zip file and can be accessed via the link below or via the link following this bulletin announcement on the Xerox Security Site.
Software available through this link:
NOTE: We are re-issuing this bulletin due to a spelling error of the name of one of the researchers. No technical content in the bulletin has changed.
Vulnerabilities exist that, if exploited, could allow remote attackers to insert arbitrary code into the device. This could occur with a specifically crafted Postscript or firmware job submitted to the device. If successful, an attacker could make unauthorized changes to the system configuration; however, customer and user passwords are not exposed.
As part of Xeroxâ€™s on-going efforts to protect customers, the ability to accept these specially crafted jobs can be disabled for the affected products listed in the bulletin. Links for the software needed are contained inside the bulletin.
Vulnerabilities in the WorkCentre M35/M45/M55, WorkCentre M165/175 and the WorkCentre Pro 32/40 Color, WorkCentre 35/45/55/65/75/90 and WorkCentre Pro 165/175 Xerox MicroServer Web Server could potentially permit unauthorized access.
Vulnerability in the WorkCentre M35/M45/M55, WorkCentre M165/M175, WorkCentre Pro 32/40 Color, WorkCentre Pro 35/45/55/65/75/90 and WorkCentre Pro C2128/C2636/C3545 Xerox MicroServer Web Server could potentially permit unauthorized access.
Note: The patch applies to launch level software only.
Vulnerability in the WorkCentre Pro Color 35/40 ESS/ Network Controller could potentially permit unauthorized access.
Vulnerability in the WorkCentre M35/M45/M55, WorkCentre Pro Color 32/40, and WorkCentre Pro 35/45/55 ESS/ Network Controller could cause Immediate Image Overwrite to fail in a specific instance with no indication after an unexpected power loss.
Vulnerability in the WorkCentre M35/M45/M55, WorkCentre Pro Color 322/40 and WorkCentre Pro 35/45/55 Xerox MicroServer Web Server could cause a denial of service.
Vulnerability in the WorkCentre M35/M45/M55, WorkCentre Pro Color 32/40, and WorkCentre Pro 35/45/55/65/75/90 ESS/ Network Controller could cause a denial of service.
WorkCentre Multifunction Devices (MFD) WorkCentre M35/M45/M55, WorkCentre Pro Color 32/40 and WorkCentre Pro 35/45/55/65/75/90 PostScript directory traversal patch.
Vulnerability in the http server on the WorkCentre M35/M45/M55, WorkCentre Pro Color 32/40 and WorkCentrePro 35/45/55/65/75/90 ESS/ Network Controller could potentially permit unauthorized access.
The Document Centre 220/230, Document Centre 240/255/265, Document Centre 332/340, Document Centre 420/425/432/440, Document Centre 460/470/480/490, Document Centre 535/545/555, WorkCentre M35/M45/M55, WorkCentre Pro Color 32/40, contain a Xerox MicroServer Web Server Vulnerability.