Faxes are an interesting attack vector. It's a safe bet that a company who are still relying on fax, instead of a fax to email service are probably going to be a bit behind the times on the rest...
Faxes are an interesting attack vector. It's a safe bet that a company who are still relying on fax, instead of a fax to email service are probably going to be a bit behind the times on the rest of their network.
How, exactly, does this exploit apply to standalone fax machines? You send a malicious fax to it. It prints the malicious fax, subject to only having a limited amount of supplies loaded... Even if...
Q: Does this only apply to all-in-one printers?
A: No. We conducted our research on all-in-one printers; however similar vulnerabilities are likely to be found in other fax implementation, such as fax-to-mail services, standalone fax machines, etc.
How, exactly, does this exploit apply to standalone fax machines?
You send a malicious fax to it. It prints the malicious fax, subject to only having a limited amount of supplies loaded...
Even if the fax successfully prints, if the machine isn't connected to the network...?
Faxes are an interesting attack vector. It's a safe bet that a company who are still relying on fax, instead of a fax to email service are probably going to be a bit behind the times on the rest of their network.
How, exactly, does this exploit apply to standalone fax machines?
You send a malicious fax to it. It prints the malicious fax, subject to only having a limited amount of supplies loaded...
Even if the fax successfully prints, if the machine isn't connected to the network...?