WorkCentre Pro 123/128 Security Information
Xerox Security Bulletin XRX12-003 v1.1 (PDF 185.5K)
March 07, 2012
NOTE: We are re-issuing this bulletin due to a spelling error of the name of one of the researchers. No technical content in the bulletin has changed.
Vulnerabilities exist that, if exploited, could allow remote attackers to insert arbitrary code into the device. This could occur with a specifically crafted Postscript or firmware job submitted to the device. If successful, an attacker could make unauthorized changes to the system configuration; however, customer and user passwords are not exposed.
As part of Xerox’s on-going efforts to protect customers, the ability to accept these specially crafted jobs can be disabled for the affected products listed in the bulletin. Links for the software needed are contained inside the bulletin.
Hard Drive Retention Offering for Xerox Products in the United States (PDF 781.5K)
February 08, 2012
Xerox Security Bulletin XRX08-005 (PDF 1M)
June 12, 2008
A persistent cross site scripting vulnerability exists in the web server of the WorkCentre M123/M128, WorkCentre 133, WorkCentre Pro 123/128 and WorkCentre Pro 133. If exploited, this vulnerability could allow code injection by malicious web users into the web pages viewed by other users.
Download Software Update: Refer to the XRX08-005 Security Bulletin to determine which file to download.
> Group 2 Languages with Postscript Executable
(zip archive 21.3M)
> Group 1 Languages with Postscript Executable
(zip archive 21.6M)
> Group 3 Languages with Postscript Executable
(zip archive 14.9M)
> Group 2 Languages Standard Executable
(zip archive 16.6M)
> Group 3 Languages Standard Executable
(zip archive 15.8M)
WorkCentre Pro 123-128 Statement Of Volatility (PDF 32.1K)
August 21, 2007