CVE-2021-35469

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on Windows systems running vulnerable Lexmark printer software. Attackers can exploit an unquoted service path in registry entries to execute arbitrary code with SYSTEM privileges. Affected users include those with Lexmark G2, G3, or G4 printer software installed.

💻 Affected Systems

Products:
  • Lexmark Printer Software G2 Installation Package
  • Lexmark Printer Software G3 Installation Package
  • Lexmark Printer Software G4 Installation Package
Versions: All versions prior to patched versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system. The vulnerability exists in the installation packages' service configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM-level compromise of the Windows host, allowing complete control over the system, installation of persistent malware, credential theft, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM privileges, enabling installation of additional malware, disabling security controls, or accessing protected system resources.

🟢

If Mitigated

Limited impact if proper endpoint protection, application whitelisting, and least privilege principles are enforced, though the vulnerability still provides a foothold for attackers.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system, not directly exploitable over the network.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a workstation (via phishing, malware, etc.), they can exploit this to gain full system control and potentially move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and standard user privileges. The unquoted service path vulnerability is well-understood and easily exploitable with publicly available techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated installation packages from Lexmark

Vendor Advisory: http://support.lexmark.com/index?id=TE952&page=content&locale=en&userlocale=EN_US

Restart Required: Yes

Instructions:

1. Download updated installation packages from Lexmark support site. 2. Uninstall vulnerable versions. 3. Install updated versions. 4. Restart affected systems.

🔧 Temporary Workarounds

Manual Registry Fix

windows

Manually quote the service path in the Windows registry to prevent exploitation

reg add "HKLM\SYSTEM\CurrentControlSet\Services\[LexmarkServiceName]" /v ImagePath /t REG_EXPAND_SZ /d "\"C:\Program Files\Lexmark\[service].exe\"" /f

Remove Vulnerable Service

windows

Uninstall or disable the vulnerable Lexmark printer software if not required

sc stop [LexmarkServiceName]
sc delete [LexmarkServiceName]

🧯 If You Can't Patch

  • Implement strict endpoint protection with behavioral monitoring to detect privilege escalation attempts
  • Apply least privilege principles and restrict standard users from writing to service directories

🔍 How to Verify

Check if Vulnerable:

Check registry for unquoted service paths: reg query "HKLM\SYSTEM\CurrentControlSet\Services" /s | findstr /i lexmark

Check Version:

Check installed Lexmark software version in Control Panel > Programs and Features

Verify Fix Applied:

Verify service paths are quoted in registry and check installed version against patched versions

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 with parent process exploiting service paths
  • Unexpected service creation or modification events
  • Process creation from unusual service locations

Network Indicators:

  • Unusual outbound connections from SYSTEM context following local user activity

SIEM Query:

source="windows" (event_id=4688 OR event_id=7045) AND (process_name="*lexmark*" OR service_name="*lexmark*") AND (command_line="*sc*" OR command_line="*reg*" OR parent_process="*cmd*")

🔗 References

📤 Share & Export