The catalyst for trust in product security.
New UK Product Security and Telecommunications Infrastructure (PSTI) legislation came into force on 29th of April 2024 to protect consumers purchasing connectable products, enabling buyers to make more informed choices.
To view the UTAX PDF document explaining how PSTI is being implemented, download here.
PSTI covers consumer connectable products such as IoT or smart devices in the UK.
What are the PSTI requirements?
The new regulations provide a set of security measures to ensure consumer connectable devices are more secure to help tackle the ongoing threats of cybercrime:
Weak passwords like ‘Admin 123’ that can be guessed or easily compromised are banned. Compliant products must have a unique password to be legally sold or made available as part of a service in the UK. This applies to both new and refurbished products placed on the market and devices made available as part of a solution or service, such as a Managed Print Service.
The regulations force manufacturers to take responsibility to maintain the products they sell by requiring them to publish a Vulnerability Disclosure Policy. Manufacturers will need to identify and flag any product security vulnerabilities and provide a mechanism for third parties to report identified risks.
The regulations require the minimum length of time that products will be supported with security updates to be published. This will help inform purchasing decisions.
All products made available to the market must be accompanied by a statement of compliance.
Further details on PSTI and how it could affect UTAX devices and those selling them, can be found here.
What does it mean for UTAX Products?
The legislation has only been applied to A4 products as these have been identified as products that could be suitable for home/personal use. As a result, UTAX A4 devices will be shipped with individual passwords to protect the devices. Below are instructions on where to locate the device password.
Please note, relevant PSTI information will be located in the device box, so it is the responsibility of the organisation opening and installing the device to locate and administer the supplied password.
What’s in the box?
What does it mean for customers?
Ultimately PSTI will give customers confidence and help them make informed purchasing decisions. The regulations are a force for good and long overdue. Products are already highly regulated to ensure they do not cause physical harm from overheating, or electrical interference. Now connectable devices will need to protect consumers from cyber harm, including loss of privacy and personal data.
Password reset
Need to reset your device password? Call 0345 680 1815 to talk to our support team or email technical@utax.co.uk.
Report a security vulnerability
Click here to report a vulnerability or a known security issue with a UTAX PSTI compliant device.
PSTI compliant devices
All UTAX’s A4 printers and MFPs that need to be PSTI compliant out of the box are listed here.
Vulnerability Disclosure Policy
UTAX (UK) Ltd are committed to providing secure products and services (referred to as “Products,” hereafter) such as MFPs, printers, solutions, and applications.
Cyberattacks have become more severe and sophisticated around the world. UTAX constantly monitors these advanced cyberattacks to reduce cybersecurity risks and enhance customers’ cybersecurity and privacy when using our products. Under these circumstances, our commitment to customers is for us to make a vulnerability response in a timely and efficient manner from the initial investigation up to the resolution of reported vulnerability issues. This commitment enables our customers to use our products securely and with ease.
Once a vulnerability is discovered, UTAX focuses on responding promptly and appropriately, including responding to customers based on security vulnerability information. PSIRT (*1) generally proceeds in the following four steps: (1) gathering and sharing security vulnerability information, (2) investigating security issues and analysing their impact on our products, (3) taking security measures against vulnerabilities, and (4) announcing to the public.
(1) Gathering and sharing security vulnerability information
UTAX checks security information using official open databases of vulnerability information such as CVE, JPCERT and gathers security information from the press, such as newspapers and the Internet. More information is also provided by contacting the customer’s nearest sales company or by inter-office members.CVE: Common Vulnerabilities and Exposures JPCERT: Japan Computer Emergency Response Team
(2) Investigating security issues and analysing their impact on our products
We investigate and analyse the phenomenon’s effects when a vulnerability is exploited and the difficulty and conditions when a malicious attacker tries to exploit a vulnerability.
(3) Taking security measures against vulnerabilities
After the investigation and analysis, if the results indicate that there is an impact, the development division continues to prepare technical and operational measures, such as applying security patches.
(4) Announcing to the public
We announce our security measures on the UTAX website, the PSIRT contact window, sales companies, or a service person.
We value dialogue with vulnerability reporters, handle reported vulnerability information in good faith, and fulfil our responsibility by disclosing vulnerability information in a timely and appropriate manner.
Circumstances
The Vulnerability Disclosure Policy is applied to include the following circumstances:
Vulnerability Handling Scope
UTAX considers any individual issues caused by including some weakness in coding or configuration that leads to your vulnerable design are not our vulnerability. We value vulnerability information submitted by reporters. However, whether the reported vulnerability information applies to the vulnerability handling scope will be determined by UTAX PSIRT.
We encourage you to report vulnerability information that can provide us with significant information that helps improve the security of products for customers. Before submission of a vulnerability report, please read this Vulnerability Disclosure Policy thoroughly and follow the process described in the following section (i.e., What to expect) in compliance with this policy. Please also note that we do not have a bug bounty program, so you cannot request monetary compensation based upon acknowledgment of the reported vulnerability.
Contact
If a vulnerability is discovered in our products, submit your vulnerability report using the reporting form below. However, if you do not wish to directly contact UTAX, we recommend submitting your report through the Coordination Centre in your country (i.e., CERT/CC) (*2).
Content
If possible, please submit your report containing the following detailed information:
(*2) The Coordination Center coordinates incident response related to stakeholders in your country in the event of an incident.
After a vulnerability is reported to UTAX PSIRT, we acknowledge receipt of the vulnerability report. We handle the process according to the following phases:
Receipt
In the receipt phase, a vulnerability reporter receives acknowledgement within 3 of our working days. The next correspondence is determined upon completion of our initial investigation. We will keep you informed of our vulnerability analysis status.
Verification
In the verification phase, we need to confirm with the respective development divisions for any reported vulnerability. We investigate and analyse the phenomenon’s effects when a vulnerability is exploited and the difficulty and conditions when a vulnerability is exploited. We ask that you provide us with a reasonable amount of time (at least 90 days from the acknowledgement) to resolve the issue before you disclose it publicly.
Remediation
In the remediation phase, the respective development divisions complete vulnerability analysis, such as the vulnerability’s potential impact on our products, possible effects when the vulnerability is exploited, and the difficulty and conditions when a malicious attacker attempts to exploit the vulnerability and validate software remediation, mitigation, and workaround. Based upon the results, the timeline will be determined so we can take temporary and permanent security measures, respectively. If a vulnerability significantly impacts the global markets and takes time to remediate, alternative mitigation measures will be offered to customers. We will provide customers with adequate security measures as soon as possible and be as transparent as possible about the steps we take during the remediation process, including on issues or challenges that may delay resolution. We will communicate closely with the vulnerability reporter.
PublicationWe are responsible for the appropriate disclosure of vulnerability information and extend the same responsibility to reporters. If UTAX PSIRT determines that the vulnerability information is critical to customers, like when there is a possibility of personal information leaks, we will publish security-related information (i.e., the advisory) on our security page of the UTAX company global website and UTAX Group company website in your country. For any public release, please coordinate with UTAX PSIRT or Computer Emergency Response Team Coordination Center (CERT/CC) (in case you contact CERT/CC in your country). Note that we create the disclosure contents based on the coordination.
You must not:
You must:
(*3) Reference: Article 17 General Data Protection Regulation (GDPR) Right to erasure (‘right to be forgotten’)
UTAX does not claim any ownership rights to the information included in the reported Vulnerability Disclosure under this Policy, including, but not limited to, any data, text, material, program code, suggestion and recommendation received from the reporter (“Reported Vulnerability Information”).
By providing any Reported Vulnerability Information to UTAX, the reporter
UTAX Devices Covered
UTAX (UK) Ltd shall, as standard, support all in-scope devices for a period of no less than three years from the point the relevant model was first made available in the UK.
These support periods are reviewed on a continual basis and extended where it is deemed prudent to do so, for the benefit of the consumer. At no point shall the support periods advertised on this webpage be reduced, therefore not complying with the PSTI legislation. Please refer to the in-scope models and applicable support periods outlined below: