Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - Samsung printers contain hardcoded backdoor account, US-CERT warns->

Submitted by Dupple
Dupple (1016592) writes "Printers manufactured by Samsung have a backdoor administrator account hard coded in their firmware that could enable attackers to change their configuration, read their network information or stored credentials and access sensitive information passed to them by users.

The hardcoded account does not require authentication and can be accessed over the Simple Network Management Protocol (SNMP) interface of the affected printers, the U.S. Computer Emergency Readiness Team (US-CERT) said in a security advisory.

SNMP is an Internet protocol commonly used to monitor and read statistics from network-attached devices.

The SNMP account found in Samsung printers has full read and write permissions and remains accessible even if SNMP is disabled using the printer's management utility, US-CERT said."

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Samsung printers contain hardcoded backdoor account, US-CERT warns

Comments Filter:

When some people discover the truth, they just can't understand why everybody isn't eager to hear it.

Working...