Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2017.0220 Xerox Security Bulletin XRX17-032 22 December 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Xerox FreeFlow Print Server Operating System: Network Appliance Impact/Access: Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade Member content until: Sunday, January 21 2018 OVERVIEW Xerox has identified a vulnerability in its FreeFlow Print Server v2.x on Windows product. [1] IMPACT Xerox has given the following details about the vulnerability: "The current existing Xerox printers supported by the FreeFlow Print Server platform connect to the Xerox Download Manager server with HTTPS (port 443) over the TLS 1.0 protocol using an RSA 2048 - bit certificate with SHA1 hash and AES 256 - bit encryption. The SHA1 encryption is a hash encryption that suffers cryptographic weakness and its days for useful protection approaching the end. Microsoft, Mozilla and Google have lost confidence in light of known attacks on SHA1 encrypted data. Their Certificate Authorities will stop issuing new SHA1 SSL certificates in 2017 in favor of stronger encryption methods. All of the public Certificate Authorities are moving from SHA1 to SHA2 for new SSL certificates."[1] MITIGATION Xerox recommends patching its affected product to the latest version in order to fix these vulnerabilities. [1] "The Update Manager patch is available for all currently supported FreeFlow Print Server versions and the Xerox printer products they support. See the supported products below: Product Xerox Printer Product FreeFlow Print Server 2.0 Xerox Color C60/C70 Printer FreeFlow Print Server 2.1 Xerox iGen 5 Press Xerox Brenva HD Production InkJet Printer"[1] REFERENCES [1] Xerox Security Bulletin XRX17-032 https://security.business.xerox.com/wp-content/uploads/2017/12/cert_XRX17-032_FFPS-Windows_UpdateManagerPatch_Dec2017.pdf AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWjx/aIx+lLeg9Ub1AQiaRQ/+NpReiJTE7MHpXVzSL13D1R8b1Uh9KCij K0vnkM1wSFXFv23vY7hvaeyq5+P0TCQqyGWdKUAv5Enzy70AqMVAcsyHKLJYvEff foKflqUDQKD8lf9eFntkUj4q7dE81DcCcPEz++hNcghu2bZcUQJjT1nIovKBzgQ3 PQ8LQh7XAC7eTwYJxWZ7uh+2y8FPPJds7JwhdPZbtO3boR4w5Hc2ZCpvM5VkOu// Mp7XxKORXlCKmS2lBkFMx+ysG5BV7g+OtjxmS352aIt6ZBeIiwkvCQrGe/F4aKxX 9CH2yx8J5JYho9KtW4Q6g4s7oBeO7ym0Hwa18kQVGm/WJNUe/g0hO2Q7Dti5HWES vgIa8bDxAB+EhozngKqgXeKwjuoiYiSbkUtXFSxSwZZ616BQHu6eA0yE/44IcI8F 2scvAXl58j4urAlVHU4SdDqDfzh0BFZg2E4r9DKHL09vwGNwF+PiMebkH8W1xvRx cpiEx33W08bE+mBAAisE+bpvetdzaqUbNZrQSBKBnYKAufulooPUArQ/bbJ4+K+F GCURLny/KOO3o8M3jM0y3e7fOf2ljIwTD+BIgMoO7Dupp13vLLaqNobSLHTj7XDe v4E71BPKpb2jIE5XEfeA2Y+/xil62wR2gla9QEOD/0w7LCzhWKGo6dZAyAeZQmIU 8zboS/zVNXA= =jQ0B -----END PGP SIGNATURE-----