GNU Bash "Shellshock" Security Vulnerability
December 5, 2014
A critical security vulnerability has been reported in the GNU Bash "Shellshock", which is a common command line used in many Linux/UNIX operating systems.
TA Triumph-Adler GmbH has investigated whether or not its products, software and services are affected. The results are as follows.
A critical security vulnerability has been reported in the GNU Bash "Shellshock", which is a common command line used in many Linux/UNIX operating systems.
TA Triumph-Adler GmbH has investigated whether or not its products, software and services are affected. The results are as follows.
Printers/MFPs
TA Triumph-Adler and UTAX products use a special embedded version of the Linux Operating System. There is no access to the Bash prompt from the network, operation panel, USB, or any other interface, therefore, TA Triumph-Adler and UTAX printers and MFPs are not susceptible to the “Shellshock” vulnerability.
Connectivity Options
"Bash" environment is not implemented in following TA Triumph-Adler and UTAX optional products, and therefore unaffected.
FAX System (*)
IB-23/IB-50/IB-51 / IB-110
FAX System (*)
IB-23/IB-50/IB-51 / IB-110
Software, Utilities
"Bash" environment is not implemented in any TA Triumph-Adler and UTAX software/utilities and therefore unaffected.
EFI™ Fiery Printing System(s)
The Fiery Printing System, optional on select KYOCERA color MFPs, uses an embedded Linux Operating System. EFI, the manufacturer of Fiery Printing Systems, has identified a vulnerability that they regard as a low security risk. EFI has created a patch to address the Shellshock vulnerability (Patch FIT 100698425.ps) that was made available on December 1st 2014. More information, as well as the patch itself, for all Linux based Fiery printer servers is available through EFIs System Update and Web Update. It is strongly recommended by EFI that this patch be immediately implemented to all potentially affected Fiery Printing Systems. For more information please speak with your local authorized dealer/reseller.
TA Cockpit / UTAX Smart
TA Cockpit and UTAX Smart use an embedded Linux Operating System. TA Triumph-Adler GmbH, the manufacturer of TA Cockpit / UTAX Smart, has identified a vulnerability that they regard as a low security risk. TA Triumph-Adler GmbH is currently working on a firmware patch, which will resolve this vulnerability, and it will be made available before January 1, 2015.
Auswirkungen der Schwachstelle CVE-2023-25954 auf unsere Produkte
27.09.2023 / CVE-2023-25954: Es besteht eine Sicherheitslücke in TA Mobile Print für Android. TA Mobile Print kann die Übertragung von Daten aus mobilen Anwendungen von Drittanbietern ermöglichen, was dazu führen kann, dass schädliche Dateien heruntergeladen werden.
Sicherheitslücke in ScannerVision
19.07.2023 / Eine Sicherheitslücke wurde in einer der Komponenten gefunden, die bei der Verarbeitung von PostScript-Dateien innerhalb der ScannerVision Server Anwendung verwendet werden. TA Triumph-Adler kennt diese Schwachstelle und nimmt diese sehr ernst. Hier finden Sie weitere Informationen.
Sicherheitslücken bei unseren Produkten (CVE-2023-34259, CVE-2023-34260 und CVE-2023-34261)
18.07.2023 / Im Webinterface unserer Drucker und Multifunktionsgeräte wurde eine Sicherheitslücke identifiziert. TA Triumph-Adler kennt die Schwachstellen (CVE-2023-34259, CVE-2023-34260 und CVE-2023-34261) und nimmt diese sehr ernst. Hier finden Sie weitere Informationen.