Pass-Back Attack Vulnerability in Konica Minolta Multifunction Printers
Pass-Back Attack Vulnerability in Konica Minolta Multifunction Printers
Dear Customers,
We deeply appreciate your constant patronage to Konica Minolta products.
A Pass-Back Attack vulnerability has been newly identified in the indicated models.
This advisory provides an overview of the issue and the recommended countermeasures.
Please note that, at the time of publication (June 30th, 2025), there have been no confirmed security incidents globally resulting from the exploitation of this vulnerability.
Overview of the vulnerabilities
Ref. ID | CVSSv3.1 (Rapid7) | Base Score | Vulnerability Description |
CVE-2025-6081 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N | 6.8 | An authenticated attacker can disclose the password of a configured external service. |
Affected Models and the countermeasure firmware
Product name | Affected version |
bizhub C751i bizhub C651i/C551i/C451i bizhub C361i/C301i/C251i bizhub C4051i/C3351i/C4001i/C3301i bizhub C3321i bizhub 751i bizhub 651i/551i/451i bizhub 361i/301i bizhub 4751i/4051i bizhub 4701i bizhub C750i bizhub C650i/C550i/C450i bizhub C360i/C300i/C250i bizhub C227i bizhub C4050i/C3350i/C4000i/C3300i bizhub C3320i bizhub 750i bizhub 650i/550i/450i bizhub 360i/300i bizhub 4750i/4050i | All versions |
bizhub C759/C659 bizhub C658/C558/C458 bizhub C368/C308/C258 bizhub C287/C227 bizhub C3851/C3351 bizhub 958/758 bizhub 658e/558e/458e bizhub 368e/308e bizhub 558/458/368/308 bizhub 227 bizhub 4752/4052 | All versions |
Impact on Multifunction Printers
There is a possibility that authentication credentials configured for external services—such as LDAP, SMTP, FTP, SMB, or WebDAV—may be exposed by means of a malicious server connection.
Vulnerability Specific Recommendations
- Ensure that the administrator password is secure. If it remains set to its factory default, please change it immediately to a strong complex password.
- Restrict non-Admin users from making any address book destination changes.
- When utilising any external service, avoid registering accounts with elevated privileges—such as those used in systems like Active Directory—on the multifunction printers.
General Security Recommendations
To ensure a secure operating posture for your multifunction devices, and to reduce exposure to the vulnerabilities described in this advisory, Konica Minolta strongly recommends applying the following configuration best practices:
1. Avoid Direct Internet Exposure
2. Change Default Passwords
3. Use Strong Passwords for Services
4. Disable Unused Services
5. Use Secure Protocols
6. Monitor Device Activity
7. Enable Authentication Where Available
For comprehensive information on secure configuration, please refer to our Product Security web site.
Enhancing the Security of Products and Services
Konica Minolta considers the security of its products and services to be an important responsibility and will continue to actively respond to incidents and vulnerabilities.
Acknowledgements
We would like to express our sincere appreciation to Mr. Deral Heiland of Rapid7 and security researcher Mr. Vladislav Volozhenko for discovering and responsibly reporting this vulnerability.
Contact
Should you require further clarification or assistance with implementing the recommended measures or applying the relevant firmware update, please contact your authorised Konica Minolta service representative.