CVE-2023-26063

9.8 CRITICAL

📋 TL;DR

This vulnerability in Lexmark devices allows attackers to access resources using incompatible types, potentially leading to remote code execution or device compromise. It affects certain Lexmark devices through February 19, 2023. Organizations using vulnerable Lexmark printers and multifunction devices are at risk.

💻 Affected Systems

Products:
  • Lexmark printers
  • Lexmark multifunction devices
Versions: All versions through 2023-02-19
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Specific device models not detailed in public advisory; check Lexmark security alerts for complete list.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full device compromise, allowing attackers to install malware, steal data, or use the device as a foothold into the network.

🟠

Likely Case

Device compromise leading to denial of service, unauthorized access to print jobs, or credential theft from device memory.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting print functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with network attack vector and no authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates released after 2023-02-19

Vendor Advisory: https://publications.lexmark.com/publications/security-alerts/CVE-2023-26063.pdf

Restart Required: Yes

Instructions:

1. Visit Lexmark support site. 2. Identify your device model. 3. Download latest firmware. 4. Apply firmware update following manufacturer instructions. 5. Reboot device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Lexmark devices on separate VLAN with restricted access

Access Control Lists

all

Implement firewall rules to restrict device access to authorized IPs only

🧯 If You Can't Patch

  • Disable all unnecessary network services on devices
  • Implement strict network segmentation and monitor for anomalous traffic

🔍 How to Verify

Check if Vulnerable:

Check device firmware version date; if before 2023-02-19, likely vulnerable

Check Version:

Check device web interface or printed configuration page for firmware version

Verify Fix Applied:

Confirm firmware version date is after 2023-02-19 and matches latest available version

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Unexpected firmware modification logs
  • Abnormal network traffic from printer IPs

Network Indicators:

  • Unexpected outbound connections from printers
  • Port scanning originating from printer IPs
  • Anomalous protocol usage on printer ports

SIEM Query:

source_ip IN (printer_ips) AND (event_type="authentication_failure" OR protocol_anomaly=true)

🔗 References

📤 Share & Export