WorkCentre 7232/7242 Security Information
Xerox Security Mini Bulletin XRX17M V1.0 (PDF 261.5K)
June 23, 2017
Generic Xerox Multifunction Device Secure Installation and Operation Guide v1.0 (PDF 232.7K)
September 06, 2012
Xerox Security Bulletin XRX12-003 v1.1 (PDF 185.5K)
March 07, 2012
NOTE: We are re-issuing this bulletin due to a spelling error of the name of one of the researchers. No technical content in the bulletin has changed.
Vulnerabilities exist that, if exploited, could allow remote attackers to insert arbitrary code into the device. This could occur with a specifically crafted Postscript or firmware job submitted to the device. If successful, an attacker could make unauthorized changes to the system configuration; however, customer and user passwords are not exposed.
As part of Xerox’s on-going efforts to protect customers, the ability to accept these specially crafted jobs can be disabled for the affected products listed in the bulletin. Links for the software needed are contained inside the bulletin.
Restricted Information Assurance Disclosure Documents
The Information Assurance Disclosure Document created for this product requires a Non-Disclosure Agreement. Follow this link to find your sales representative.
> Blank Non-Disclosure Agreement
Common Criteria Certification of the WorkCentre 7232/7242
January 18, 2011
JISEC Validated Product Listing
Certification Report (PDF, 162KB)
Xerox Security Bulletin XRX09-004 (PDF 83.5K)
September 18, 2009
Original Release September 1, 2009
An LPD protocol handling vulnerability exists in the firmware for the WorkCentre 7232/7242, the WorkCentre 7328/7335/7345/7346, and the WorkCentre 7425/7428/7435. If exploited, this vulnerability could cause a denial of service by crashing the device, although power cycling the device will recover from this attack. Customer and user passwords are not exposed.
WorkCentre 7242-7232 Statement of Volatility (PDF 40K)
May 16, 2008