Published:2021/12/24  Last Updated:2021/12/24

JVNVU#95192472
Multiple vulnerabilities in KONICA MINOLTA MFPs and printing systems

Overview

KONICA MINOLTA multi-function printers (MFP) and printing systems contain multiple vulnerabilities.

Products Affected

A wide range of products and versions are affected.

For more information, refer to the information provided by the developer.

Description

Multi-function printers (MFP) and printing systems provided by KONICA MINOLTA, INC. contain multiple vulnerabilities listed below.

  • Incorrect authorization (CWE-863) - CVE-2021-20868
    CVSS v3 CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N Base Score: 4.2
  • Exposure of sensitive information to an unauthorized actor (CWE-200) - CVE-2021-20869
    CVSS v3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score: 5.3
  • Improper handling of exceptional conditions (CWE-755) - CVE-2021-20870
    CVSS v3 CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N Base Score: 4.0
  • Exposure of sensitive information to an unauthorized actor (CWE-200) - CVE-2021-20871
    CVSS v3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score: 5.3
  • Protection mechanism failure (CWE-693) - CVE-2021-20872
    CVSS v3 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score: 6.4

Impact

  • If external server authentication is enabled, user credentials may be obtained via a specific SOAP message sent by an administrative user. - CVE-2021-20868
  • If LDAP server authentication is enabled, some of user credentials may be obtained via a specific SOAP message. - CVE-2021-20869
  • When scanned data transmission is stopped due to the network error, unsent scanned image data may be obtained by ejecting a HDD before the scan job times out. - CVE-2021-20870
  • When the destination information including credentials are registered in the address book, the credentials may be obtained via a specific SOAP message. - CVE-2021-20871
  • The firmware integrity verification is bypassed, and malicious firmware may be installed. - CVE-2021-20872

Solution

Update the firmware
Update the firmware to the latest version according to the information provided by the developer.
The developer states that the firmware update will be applied on remote maintenance or KONICA MINOLTA customer engineer's on-site maintenance.

Apply workarounds
Applying the following workarounds may mitigate the impacts of these vulnerabilities.

  • Encrypt HDD/SSD
  • Change the initial administrative password to some hard-to-guess one
  • Use a private IP address and set up a firewall to prevent unauthorized accesses from outside
  • Properly configure security functions implemented in the products
For more information, refer to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

KONICA MINOLTA, INC. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2021-20868
CVE-2021-20869
CVE-2021-20870
CVE-2021-20871
CVE-2021-20872
JVN iPedia