CVE-2021-35449
📋 TL;DR
This vulnerability allows low-privileged users to escalate privileges to SYSTEM level by exploiting Lexmark printer drivers during the add printer process. Attackers can execute arbitrary DLLs, gaining full system control. Affected users include those running vulnerable Lexmark Universal Print Driver, G2, G3, or G4 drivers.
💻 Affected Systems
- Lexmark Universal Print Driver
- Lexmark G2 Driver
- Lexmark G3 Driver
- Lexmark G4 Driver
📦 What is this software?
G2 Driver by Lexmark
G3 Driver by Lexmark
G4 Driver by Lexmark
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, allowing installation of persistent malware, credential theft, and lateral movement across the network.
Likely Case
Local privilege escalation enabling attackers to bypass security controls, install unauthorized software, or access restricted data on the compromised system.
If Mitigated
Limited impact if proper privilege separation exists and users have minimal local access rights, though the vulnerability still presents a significant security risk.
🎯 Exploit Status
Exploit code is publicly available on Packet Storm Security. Exploitation requires local user access but is straightforward to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to versions above those listed in affected systems
Vendor Advisory: http://support.lexmark.com/alerts/
Restart Required: Yes
Instructions:
1. Visit Lexmark support site. 2. Download latest driver versions. 3. Uninstall vulnerable drivers. 4. Install updated drivers. 5. Restart system.
🔧 Temporary Workarounds
Restrict Printer Installation Rights
windowsPrevent standard users from adding printers via Group Policy or local security settings
gpedit.msc → Computer Configuration → Administrative Templates → Printers → 'Prevent addition of printers' → Enabled
Remove Vulnerable Drivers
windowsUninstall affected Lexmark drivers from systems
Control Panel → Programs and Features → Uninstall Lexmark drivers
🧯 If You Can't Patch
- Implement least privilege access controls to limit standard user permissions
- Monitor for suspicious DLL loading events during printer installation processes
🔍 How to Verify
Check if Vulnerable:
Check installed Lexmark driver versions in Control Panel → Programs and Features or via 'wmic printer get driverName, driverVersion' command
Check Version:
wmic printer get driverName, driverVersion | findstr /i lexmark
Verify Fix Applied:
Verify driver versions are above vulnerable ranges and test privilege escalation attempts fail
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs showing unexpected DLL loading during printer installation
- Security logs showing privilege escalation attempts
Network Indicators:
- Unusual outbound connections from systems after printer driver installation
SIEM Query:
EventID=4688 AND ProcessName LIKE '%lexmark%' AND CommandLine CONTAINS 'dll'
🔗 References
- http://packetstormsecurity.com/files/163811/Lexmark-Driver-Privilege-Escalation.html
- http://support.lexmark.com/alerts/
- https://raw.githubusercontent.com/jacob-baines/vuln_disclosure/main/vuln_2021_02.txt
- http://packetstormsecurity.com/files/163811/Lexmark-Driver-Privilege-Escalation.html
- http://support.lexmark.com/alerts/
- https://raw.githubusercontent.com/jacob-baines/vuln_disclosure/main/vuln_2021_02.txt