CVE-2021-44737

8.8 HIGH

📋 TL;DR

This CVE describes a PJL directory traversal vulnerability in Lexmark printers and multifunction devices that allows attackers to overwrite internal configuration files. The vulnerability affects Lexmark devices through December 7, 2021, potentially enabling unauthorized configuration changes or device compromise.

💻 Affected Systems

Products:
  • Lexmark printers
  • Lexmark multifunction devices
Versions: All versions through 2021-12-07
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with PJL (Printer Job Language) enabled, which is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover, persistent backdoor installation, or device bricking through malicious configuration file overwrites.

🟠

Likely Case

Unauthorized configuration changes, service disruption, or credential theft from configuration files.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthorized PJL access.

🌐 Internet-Facing: HIGH - Lexmark devices exposed to the internet are directly vulnerable to exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the device's PJL port (typically 9100/tcp).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates released after 2021-12-07

Vendor Advisory: https://support.lexmark.com/alerts/

Restart Required: Yes

Instructions:

1. Check Lexmark support site for your specific device model. 2. Download latest firmware. 3. Apply firmware update following manufacturer instructions. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to PJL port (9100/tcp) to authorized systems only

firewall rules to block 9100/tcp from untrusted networks

Disable PJL

all

Disable PJL protocol if not required for business operations

Device configuration: Disable PJL in printer settings

🧯 If You Can't Patch

  • Segment printers on isolated network VLAN
  • Implement strict firewall rules blocking external access to printer ports

🔍 How to Verify

Check if Vulnerable:

Check device firmware version date - if before 2021-12-07, likely vulnerable. Test PJL access to port 9100.

Check Version:

Check printer web interface or control panel for firmware version/date

Verify Fix Applied:

Verify firmware version is post-2021-12-07. Test that directory traversal attempts via PJL are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual PJL commands in printer logs
  • Configuration file modification events
  • Multiple failed PJL access attempts

Network Indicators:

  • Traffic to printer port 9100/tcp from unusual sources
  • PJL commands containing directory traversal patterns (../)

SIEM Query:

source_port:9100 AND (payload_contains:"../" OR payload_contains:"..\\")

🔗 References

📤 Share & Export