<\/p>\n
Two recently discovered vulnerabilities in the fax protocol can transform fax machines into entry points for hackers into corporate networks, two Check Point researchers revealed last week in a talk given at the DEF CON 26 security conference held in Las Vegas.<\/p>\n
Named “Faxploit,” this attack targets the ITU T.30 fax protocol, according to a copy of the\u00a0DEF CON presentation<\/a>given by Eyal Itkin and Yaniv Balmas last week.<\/p>\n More specifically, Faxploit leverages two buffer overflows in the fax protocol components that handle DHT and COM markers \u2014CVE-2018-5924 and CVE-2018-5925, respectively.<\/p>\n