Multiple vulnerabilities in B/W printers

Multiple security vulnerabilities have been newly identified in the indicated models. This advisory provides an overview of the issues and the recommended countermeasures.

Dear Customers,

We deeply appreciate your constant patronage to Develop products.

Multiple security vulnerabilities have been newly identified in the indicated models.

This advisory provides an overview of the issues and the recommended countermeasures.

Please note that, at the time of writing, there have been no confirmed security incidents globally resulting from the exploitation of these vulnerabilities.

Overview of the vulnerabilities

Ref. IDVulnerabilities descriptionRef web site
CVE-2017-9765Stack Buffer Overflow VulnerabilityLink
CVE-2024-2169Infinite Loop of Messages Between ServersLink
CVE-2024-51977Possibility of information leakage in the printerLink
CVE-2024-51978Possibility of Authentication BypassLink
CVE-2024-51979Possible Stack OverflowLink
CVE-2024-51980Possibility of a forced TCP connectionLink
CVE-2024-51981Possibility of arbitrary HTTP request executionLink
CVE-2024-51983External attacks can cause device to crashLink
CVE-2024-51984Possibility of information leakage in the printer due to pass-back attacksLink

Affected Models and the countermeasure firmware

Product nameProgram nameAffected versionFixed version
ineo 5020iMain-FirmwareU2406280431(Ver R) or earlierU2412241059 (Ver S)or later
Sub-Firmware1.13 or earlier1.15 or later
ineo 5000iMain-Firmware1.32 or earlier1.33 or later
Sub-Firmware1.13 or earlier1.15 or later
ineo 4020iMain-FirmwareU2406280431(Ver R)or earlierU2412241059(Ver S)or later
Sub-Firmware1.13 or earlier1.15 or later
ineo 4000iMain-Firmware1.28 or earlier1.29 or later
Sub-Firmware1.13 or earlier1.15 or later

Remediations

  • Download the Firmware Update Tool from Drivers & Downloads and upgrade the firmware of your device.
    -> Before proceeding, please refer to the attached Firmware Update Procedure guide.
  • If the default administrator password has not yet been changed, it is strongly recommended to update it to a complex and unique password immediately after the update.

You can download a complete guide for the firmware update procedure here:
Firmware Update Procedure Guide

Vulnerability Specific Recommendations

Ref. IDMitigations
CVE-2017-9765Disable WSD feature.
CVE-2024-2169Disable TFTP.
CVE-2024-51977Upgrade to the latest firmware. (There is no workaround available.)
CVE-2024-51978Change the administrator password from the default value.
CVE-2024-51979Change the administrator password from the default value.
CVE-2024-51980Disable WSD feature.
CVE-2024-51981Disable WSD feature.
CVE-2024-51983Disable WSD feature.
CVE-2024-51984Disable WSD feature.

General Security Recommendations

To ensure a secure operating posture for your multifunction devices, and to reduce exposure to the vulnerabilities described in this advisory, Develop strongly recommends applying the following configuration best practices:

  1. Avoid Direct Internet Exposure
    Place devices behind firewalls and use private IP addressing.
  2. Change Default Passwords
    Change default credentials and implement strong passwords for administrative and network functions.
  3. Use Strong Passwords for Services
    Ensure strong credentials are configured for SMTP, LDAP, and any other integrated services.
  4. Disable Unused Services
    Turn off unused ports or protocols (specifically WSD & TFTP) to reduce attack surface.
  5. Use Secure Protocols
    Configure devices to use encrypted communications (e.g., HTTPS, LDAPS, IPPS) where supported.
  6. Monitor Device Activity
    Regularly review device logs and network traffic for suspicious behavior.
  7. Enable Authentication Where Available
    Use built-in user authentication features to prevent unauthorized access to device functions.

Enhancing the Security of Products and Services

Konica Minolta considers the security of its products and services to be an important responsibility and will continue to actively respond to incidents and vulnerabilities.
Enhancing the Security of Products and Services

Contact

Should you require further clarification or assistance with implementing the recommended measures or applying the relevant firmware update, please contact your authorized Develop service representative.