Pass-back attack vulnerability in MFPs

Dear Customers,

We deeply appreciate your constant patronage to Develop products.

A Pass-Back Attack vulnerability has been newly identified in the indicated models below.

This advisory provides an overview of the issue and the recommended countermeasures.

Please note that, at the time of publication (June 30th, 2025), there have been no confirmed security incidents globally resulting from the exploitation of this vulnerability.

Overview of the vulnerability

Ref. IDCVSSv3.1 (Rapid7)Base ScoreVulnerability description
CVE-2025-6081CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N6.8An authenticated attacker can disclose the password of a configured external service.

Affected Models

Product nameAffected version
ineo+ 751i
ineo+ 651i/+551i/+451i
ineo+ 361i/+301i/+251i
ineo+ 4051i/+3351i/+4001i/+3301i
ineo+ 3321i
ineo 751i
ineo 651i/551i/451i
ineo 361i/301i
ineo 4751i/4051i
ineo 4701i
ineo+ 750i
ineo+ 650i/+550i/+450i
ineo+ 360i/+300i/+250i
ineo+ 287i/+257i/+227i
ineo+ 4050i/+3350i/+4000i/+3300i
ineo+ 3320i
ineo 950i/850i
ineo 750i
ineo 650i/550i/450i
ineo 360i/300i
ineo 306i/266i/246i/226i
ineo 4750i/4050i
ineo 4700i
All versions
ineo+ 759/+659
ineo+ 658/+558/+458
ineo+ 368/+308/+258
ineo+ 287/+227
ineo+ 3851/+3851FS/+3351
ineo 958/808/758
ineo 658e/558e/458e
ineo 368e/308e
ineo 558/458/368/308
ineo 367/287/227
ineo 4752/4052
All versions

Impact on Multifunction Printers

There is a possibility that authentication credentials configured for external services—such as LDAP, SMTP, FTP, SMB, or WebDAV—may be exposed by means of a malicious server connection.

Vulnerability Specific Recommendation

  1. Ensure that the administrator password is secure. If it remains set to its factory default, please change it immediately to a strong complex password.
  2. Restrict non-admin users from making any address book destination changes.
  3. When utilizing any external service, avoid registering accounts with elevated privileges—such as those used in systems like Active Directory—on the multifunction printers.

General Security Recommendations

To ensure a secure operating posture for your multifunction devices, and to reduce exposure to the vulnerabilities described in this advisory, Develop strongly recommends applying the following configuration best practices:

  1. Avoid Direct Internet Exposure
    Place devices behind firewalls and use private IP addressing and Device IP Filtering settings.
  2. Change Default Passwords
    Change default credentials and implement strong passwords for administrative and network functions.
  3. Use Strong Passwords for Services
    Ensure strong credentials are configured for SMTP, LDAP, SMB, WebDAV, and any other integrated services.
  4. Disable Unused Services
    Turn off unused ports or protocols to reduce attack surface.
  5. Use Secure Protocols
    Configure devices to use encrypted communications (e.g., HTTPS, LDAPS, IPPS) where supported.
  6. Monitor Device Activity
    Regularly review device logs and network traffic for suspicious behavior.
  7. Enable Authentication Where Available
    Use built-in user authentication features to prevent unauthorized access to device functions.

For comprehensive information on secure configuration, please refer to our product security web site.
https://www.konicaminolta.com/global-en/security/mfp/setting/index.html

Enhancing the Security of Products and Services

Develop considers the security of its products and services to be an important responsibility and will continue to actively respond to incidents and vulnerabilities.
https://www.konicaminolta.com/about/csr/social/customers/enhanced_security.html

Acknowledgements

We would like to express our sincere appreciation to Mr. Deral Heiland of Rapid7 and security researcher Mr. Vladislav Volozhenko for discovering and responsibly reporting this vulnerability.

Contact

Should you require further clarification or assistance with implementing the recommended measures or applying the relevant firmware update, please contact your authorized Develop service representative.