WorkCentre 5665/5675/5687 Security Information
WorkCentre Removable Hard Drive Brochure (PDF 201.3K)
October 22, 2015
FIPS 140-2 Validation Document V2.0 (PDF 202.4K)
August 17, 2015
NOTE: This is a new version of the document that rebrands the document.
Hard Drive Retention Offering for Xerox Products in the United States (PDF 264.5K)
February 02, 2015
Xerox Security Bulletin XRX12-005 V1.1 (PDF 103.3K)
March 25, 2013
The Xerox devices ColorQube® 9201/9202/9203, ColorQube® 9301/9302/9303, WorkCentre® 232/238/245/255/265/275, WorkCentre® 5030/5050, WorkCentre® 5135/5150, WorkCentre® 5632/5638/5645/5655/5665/5675/5687, WorkCentre® 5735/5740/5745/5755/5765/5775/5790, WorkCentre® 6400, WorkCentre® 7525/7530/7535/7545/7556, WorkCentre® 7655/7665/7675, WorkCentre® 7755/7765/7775, WorkCentre® Bookmark 40/55, WorkCentre Pro® 232/238/245/255/265/275 were shipped with certain protocols enabled that, if properly exploited, could be used to gain
unauthorized access to the system. These particular protocols should not have been present in the production configuration and need to be removed from that configuration to minimize the possibility of unauthorized system access.
A software solution (patch P49) is provided for the products listed. This solution will remove from the production configuration the unwanted protocols in question so they can’t be exploited to gain unauthorized access to the system.
This solution is designed to be installed by the customer. The software solution is compressed into a 3 KB zip file and can be accessed via the link below or via the link following this bulletin announcement on http://www.xerox.com/security.
Software available through this link:
(zip archive 2.5K)
Xerox Security Bulletin XRX12-004 V1.0 (PDF 64.5K)
May 07, 2012
The vulnerability documented in CVE-2011-3192 exists in the Web Server of the WorkCentre 5135/5150, and the WorkCentre 5632/5638/5645/5655/5665/5675/5687 models. If exploited the vulnerability could allow remote attackers to create a Denial of Service on the device.
A software solution (patch P50) is provided below. This solution is designed to be installed by the customer. Please follow the procedures in the bulletin to install the solution to protect your product from possible attack through the network.
The software solution is compressed into an 5.2 MB zip file and can be accessed via the link below or via the link following this bulletin announcement on www.xerox.com/security.
(zip archive 5.2M)
Xerox Security Bulletin XRX12-003 v1.1 (PDF 185.5K)
March 07, 2012
NOTE: We are re-issuing this bulletin due to a spelling error of the name of one of the researchers. No technical content in the bulletin has changed.
Vulnerabilities exist that, if exploited, could allow remote attackers to insert arbitrary code into the device. This could occur with a specifically crafted Postscript or firmware job submitted to the device. If successful, an attacker could make unauthorized changes to the system configuration; however, customer and user passwords are not exposed.
As part of Xerox’s on-going efforts to protect customers, the ability to accept these specially crafted jobs can be disabled for the affected products listed in the bulletin. Links for the software needed are contained inside the bulletin.
Xerox Security Bulletin XRX10-003 (PDF 57.9K)
November 29, 2010
Original Release June 18, 2010
System Software Version 021.120.060.00015 for the WorkCentre 5632-5687 Multi-Board controller and WorkCentre 5135/5150 models and System Software Version 025.054.060.00015 for the 5632-5655 Single Board controller models is a cumulative update that incorporates several security vulnerability fixes as well as other non-security related defect fixes. Both devices have been recertified to Common Criteria EAL Level 3. Both releases have been submitted for Common Criteria certification, which is expected to be completed by September 2010.
> Download System Software Release for the Multi-Board Controller (MBC) products
(zip archive 106.1M)
Secure Installation and Operation of Your WorkCentre 5632/5638/5645/5655/5665/5675/5687 (PDF 183.9K)
August 20, 2010
WorkCentre 5632/5638/5645/5655/5665/5675/5687 Information Assurance Disclosure Paper (PDF 425.7K)
April 08, 2010
Xerox Security Bulletin XRX10-002 (PDF 113K)
March 29, 2010
Original Release January 22, 2010
Vulnerabilities exist in the Network Controller and Web Server of the WorkCentre 5632/5638/5645/5655/5665/5675/5687, WorkCentre 5030/5050, WorkCentre 5135/5150, WorkCentre 6400, WorkCentre 7655/7665/7675, WorkCentre 7755/7765/7775, WorkCentre/WorkCentre Pro 232/238/245/255/265/275 and ColorQube 9201/9202/9203 products. If exploited these vulnerabilities could permit an attacker to either bypass Scan to Mailbox authorization to access mailboxes stored on the device or bypass web server authorization to view device configuration settings. Customer and user passwords are not exposed.
> Download Software Update for the WorkCentre, WorkCentre Pro and ColorQube products listed above
(zip archive 2.5M)
Xerox Security Bulletin XRX09-002 (PDF 73.9K)
May 15, 2009
A command injection vulnerability exists in the web server of the WorkCentre/WorkCentrePro 232/238/245/255/265/275, the WorkCentre 7655/7665/7675, and the WorkCentre 5632/5638/5645/5655/5675/5687. if exploited, the vulnerability could allow remote attackers to execute arbitrary code via carefully crafted inputs on the affected web page. Customer and user passwords are not exposed.
> Download Software Update for WorkCentre/WorkCentrePro 232/238/245/255/265/275, WorkCentre 7655/7665/7675, and WorkCentre 5632/5638/5645/5655/5675/5687
(zip archive 7.9M)
WorkCentre 5632-5638-5645-5655-5675-5687MFP Statement of Volatility (PDF 161.6K)
March 16, 2009
WorkCentre 5632-5638-5645-5655-5675-5687 Copier Statement of Volatility (PDF 26.7K)
March 16, 2009
Xerox Security Bulletin XRX09-003 (PDF 82.9K)
January 22, 2009
Second Release September 29, 2009
Original Release August 28, 2009
A vulnerability exists in the web servers of the WorkCentre 5030/5050, the WorkCentre 5135/5150, the WorkCentre 5632/5638/5645/5655/5665/5675/5687, the WorkCentre 7655/7665/7675, the WorkCentre 6400, and the ColorQube 9201/9202/9203. If exploited when SSL is not enabled on the device, the vulnerability could allow remote attackers to obtain unauthorized access to device configuration settings, possibly exposing customer passwords
NOTE: The original version of the P39 patch required a manual reboot after installation. This version of the patch automatically performs a re-boot upon installation.
> Download Software Update for the WorkCentre and ColorQube products listed above
(zip archive 11.4K)
Xerox Security Bulletin XRX08-009 (PDF 104.4K)
October 16, 2008
A vulnerability exists in the WorkCentre Pro 232/238/245/255/265/275, WorkCentre 232/238/245/255/265/275, WorkCentre 7655/7665/7675, and WorkCentre 5632/5638/5645/5655/5665/5675/5687 ESS/Network Controller that, if exploited, could allow remote attackers to execute arbitrary code via specially crafted Remove Service Message Block (SMB) responses. This could occur with buffer overflows and un-validated user input in the Samba third-party code that handles file and printer sharing services for SMB clients (including Xerox MFD devices).
If successful, an attacker could make unauthorized changes to the system configuration; however, customer and user passwords are not exposed. This vulnerability affects only the printer sharing services.
> Download Software Update for WorkCentre Pro 232/238/245/255/265/275, WorkCentre 232/238/245/255/265/275, WorkCentre 7655/7665/7675, and WorkCentre 5632/5638/5645/5655/5665/5675/5687
(zip archive 6.6M)
Xerox Security Bulletin XRX08-003 (PDF 27.9K)
March 28, 2008
As part of Xerox’s on-going efforts to protect customers, a patch is being provided for customers interested in the Common Criteria Certified version, 21.113.02.000, for the WorkCentre 56xx products that adds improved audit logging to meet the requirements of NIAP Policy #15.
> Download Software Update for WorkCentre 56xx products
(zip archive 19.6M)