Jump to content
Ultimaker Community of 3D Printing Experts

Ultimaker 3 Extended - CVE-2021-23017 nginx Vulnerability


noverby
 Share

Recommended Posts

Posted · Ultimaker 3 Extended - CVE-2021-23017 nginx Vulnerability

Good day folks!
 

We utilize Qualys to scan our network for security vulnerabilities, and a recent scan returned a hit for CVE-2021-23017, which seems to be a fairly nasty nginx vulnerability on our Ultimaker 3 Extended running firmware version 5.3.0.  I've been tasked by our security group to find out if the fix for that vulnerability is going to be backported into the version of nginx in use on the device?

 

Thanks!

  • Link to post
    Share on other sites

    Posted · Ultimaker 3 Extended - CVE-2021-23017 nginx Vulnerability

    @noverby Thanks for bringing this to our attention. We checked the vulnerability and it's only applicable when a certain configuration option in nginx is active. In our UM3 printers that option is not present, so this CVE is not applicable.

    I'll make a note to update nginx in a next release, but because it has no impact on our printers we won't rush a new release.

    • Like 1
    Link to post
    Share on other sites

    Posted (edited) · Ultimaker 3 Extended - CVE-2021-23017 nginx Vulnerability

    Hello! Could you please also comment on JQuery and nginx ( outdated versions ) for 7.0.0.0 ( Ultimaker S5 ). We are also have complains from our IT department due to firmware vulnerabilities. Will it be updated in the next patch? Thank you!

    Edited by esertuk
  • Link to post
    Share on other sites

    Posted (edited) · Ultimaker 3 Extended - CVE-2021-23017 nginx Vulnerability

    @esertuk Just like @CarloK said above none of our printers are using the configuration option that allows for that particular exploit, so we are not rushing to include a new version. Nor are we currently aware of any CVE for nginx that we do expose our users to since all require specific configurations we don't use). We do asses security concerns on an ongoing basis, I imagine you could contact support and request our latest security assessment documentation.

     

    I think the Jquery CVE's concerning XSS are a valid concern (albeit with the low impact of at worst (re-)starting a print, not retrieval of information AFAIK).
    The S3 and the S5 have the option to enable the firewall, you can still use the cloud platform if you do but none of the software running on the printer is exposed to attackers on your internal network. This should alleviate any concerns from your IT department.

    Edit: Adding up-sell, FTW? 😛
    If your organization subscribes to Ultimaker Essentials your IT department can block access to the printer settings by configuring a pin code and enable the firewall on all printers remotely.
    // Now I feel dirty, you can just enable the firewall and tell everyone to leave it on.

    Edited by robinmdh
    adding the up-sell
  • Link to post
    Share on other sites

    Create an account or sign in to comment

    You need to be a member in order to leave a comment

    Create an account

    Sign up for a new account in our community. It's easy!

    Register a new account

    Sign in

    Already have an account? Sign in here.

    Sign In Now
     Share

    • Our picks

      • New here? Get ahead with a free onboarding course
        Hi,
         
        Often getting started is the most difficult part of any process. A good start sets you up for success and saves you time and energy that could be spent elsewhere. That is why we have a onboarding course ready for
        Ultimaker S5 Pro Bundle, Ultimaker S5, Ultimaker S3 Ultimaker 2+ Connect.   
        They're ready for you on the Ultimaker Academy platform. All you need to do to gain access is to register your product to gain free access. 
        Ready? Register your product here in just 60 seconds.
          • Like
        • 11 replies
    ×
    ×
    • Create New...