
How to Prevent Malware from Abusing Network Printers
Concerned about malware using your printer to spread or spy? Here's how to secure network printers against malicious software and attacks.
What's Happening
Network printers are often overlooked as security risks, but they can be vulnerable entry points for malware. Printers connected to your network can be exploited by malicious software to print spam, spread to other devices, spy on documents, or even serve as a foothold for attackers to access your network. This isn't just theoretical—real malware like PrintNightmare and PrintDemon have specifically targeted printer vulnerabilities. If a printer is poorly secured, it can become a weak link in your otherwise secure network. This guide will help you lock down your printer against malware threats.
Quick Checks (Do These First)
- Is your printer's firmware up to date? Outdated firmware is one of the biggest vulnerabilities. Check for updates immediately.
- Is your printer accessible from the internet? Go to shodan.io and search for your public IP. If your printer shows up, it's exposed and needs to be locked down immediately.
- Does your printer have default credentials? If you've never changed the admin password, attackers can easily take control.
Step-by-Step Fixes
Fix 1: Update Printer Firmware Immediately
The single most important defense against malware is keeping firmware updated. Manufacturers release patches for discovered vulnerabilities.
- Find your printer's IP address (print a network configuration page)
- Type the IP address into a web browser to access the printer's web interface
- Log in with admin credentials
- Navigate to Settings, Maintenance, or Firmware Update
- Check for updates and install any available
- Or visit the manufacturer's website:
- HP: support.hp.com > enter model > Downloads > Firmware
- Canon: canon.com/support > Products > Your model > Drivers & Downloads
- Epson: epson.com/support > Your model > Downloads
- Brother: brother.com/support > Product > Downloads
- Download the latest firmware and install according to instructions
- Enable Automatic Updates if you trust the manufacturer (but see security note in Fix 2)
Critical vulnerabilities to patch: PrintNightmare (CVE-2021-34527), PrintDemon, CUPS vulnerabilities (for network Unix printing)
Fix 2: Change Default Credentials and Secure Admin Access
Default passwords are publicly known and easily exploited by malware and attackers.
- Access your printer's web interface
- Log in with current credentials (if still using defaults like "admin/admin", this is urgent)
- Go to Security or Administrator Settings
- Change the admin username and password to something strong:
- At least 12 characters
- Mix of uppercase, lowercase, numbers, symbols
- Not related to "printer," "admin," or your model number
- Disable Remote Management if you don't need it
- Enable HTTPS only for web interface access (disable HTTP)
- Enable SNMPv3 (if your printer uses SNMP) and disable older versions (SNMPv1/v2) which transmit passwords in cleartext
- Save all changes
Fix 3: Disable Unnecessary Network Services and Protocols
Printers run many network services that can be exploited. Disable anything you don't actively use.
- In your printer's web interface, go to Network or Services
- Review enabled protocols and disable these if not needed:
- FTP (File Transfer Protocol) - rarely needed, often insecure
- Telnet - unencrypted remote access, major vulnerability
- SNMPv1/v2c - older versions are insecure, use SNMPv3 or disable
- LPD/LPR - legacy printing protocol, disable if you use IPP instead
- Bonjour/mDNS - makes printer discoverable, disable if you don't need AirPrint
- Web Services - cloud printing features like HP ePrint (disable if you don't use them)
- UPnP - can allow unauthorized port forwarding, major security risk
- Keep only the protocols you need (typically: IPP, HTTP/HTTPS for web interface, SNMP v3 if you monitor the printer)
- Save settings
Fix 4: Isolate Printer on Separate Network Segment
The best defense is preventing malware on one device from reaching your printer in the first place.
Option A: Use VLAN or Guest Network (Recommended)
- Set up a separate VLAN or guest network for IoT devices and printers
- Connect your printer to this isolated network
- Configure firewall rules:
- Allow computers on main network → printer (printing ports only: 9100, 631)
- Block printer → main network (prevents printer from initiating connections)
- Block or heavily restrict printer → internet (prevents cloud exploits and data exfiltration)
- This way, even if the printer is compromised, malware can't spread to your computers
Option B: Use Software Firewall on Computer
- If you can't do network segmentation, configure your computer's firewall
- Block all incoming connections from your printer's IP except on printing ports
- On Windows Firewall, create rules to allow printer communication but block file sharing and admin protocols
Fix 5: Enable Printer Access Control and Authentication
Require authentication so malware can't just send arbitrary print jobs.
- In printer web interface, go to Security or Access Control
- Enable User Authentication or Secure Printing
- Require PIN or password for all print jobs
- Create an Access Control List (ACL) with only allowed device MAC addresses or IP addresses
- Enable IPsec or 802.1X authentication if your printer and network support it (enterprise feature)
- Disable Anonymous Printing
This means only authenticated users and devices can send print jobs—malware running in the background won't have the credentials to abuse the printer.
Fix 6: Disable Print Spooler Service on Computers (Windows)
Many Windows malware variants exploit the Print Spooler service (like PrintNightmare). If you don't print often, disable it.
- Press Windows + R, type
services.msc, hit Enter - Scroll down to Print Spooler
- Right-click and select Properties
- Change Startup type to Disabled
- Click Stop to stop the service immediately
- Click OK
Note: This prevents all printing from this computer. Only do this if you rarely print or are willing to manually enable it when needed.
Alternative: Keep Print Spooler enabled but apply Microsoft's patches for PrintNightmare and configure it to only accept signed drivers.
Fix 7: Monitor Printer for Suspicious Activity
Set up monitoring to detect if your printer is being abused.
- Enable Logging in your printer's web interface
- Configure it to log all print jobs, access attempts, and configuration changes
- Review logs regularly (or use SIEM tools if you're in a business environment)
- Set up email alerts for:
- Failed login attempts
- Configuration changes
- Unusual print jobs (especially at odd hours)
- High volume of print jobs from unknown sources
- Check printer's Job History regularly for unexpected jobs
If you see print jobs you didn't send, especially with strange names or from unknown users, investigate immediately—your network might be compromised.
Fix 8: Patch Windows Print Vulnerabilities
Make sure your computers have the latest Windows updates to patch print-related vulnerabilities.
- Go to Settings > Update & Security > Windows Update
- Click Check for updates
- Install all available updates, especially security patches
- Pay special attention to updates mentioning "Print Spooler" or printing vulnerabilities
- Restart if prompted
Microsoft has released multiple patches for print-related exploits. Keeping Windows updated closes these holes.
If Nothing Worked
If you suspect your printer is already compromised (printing random documents, network traffic from the printer to suspicious IPs, or changed settings you didn't modify), you need to take immediate action. Disconnect the printer from the network, perform a full factory reset, update firmware to the latest version, change all credentials, and then reconnect it with all security measures in place. Scan all computers on your network with updated antivirus and anti-malware tools. Consider getting a professional security audit if you handle sensitive data—compromised printers in business environments can lead to serious data breaches.
When to Call a Pro
Network printer security is complex, especially in business environments. If you're managing multiple printers, handling sensitive documents (medical, legal, financial), or have already experienced a security incident, professional help is essential. IT security professionals can conduct vulnerability assessments, implement network segmentation, configure enterprise-grade authentication systems, and set up monitoring to detect threats in real time. For businesses, this isn't optional—printer security is part of overall network security and compliance requirements. A compromised printer can violate HIPAA, GDPR, and other regulations, leading to serious penalties.
Need Professional Help?
If you're in the Tampa Bay area and need hands-on assistance, Geeks in Sneaks provides friendly, on-site tech support in Clearwater, Clearwater Beach, and Dunedin.
Related Topics
Need Professional Help?
If you're still having trouble, our expert technicians can help.
Learn about our printer support service