CVE-2023-26065

9.8 CRITICAL

📋 TL;DR

This CVE describes an integer overflow vulnerability in certain Lexmark devices that could allow remote code execution. Attackers could exploit this to take control of affected printers and multifunction devices. Organizations using vulnerable Lexmark devices through February 2023 are affected.

💻 Affected Systems

Products:
  • Lexmark printers and multifunction devices
Versions: All versions through 2023-02-19
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Specific device models not detailed in public advisory; all devices with firmware dated through February 2023 should be considered vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full control of device, installs persistent malware, pivots to internal network, and exfiltrates sensitive print data.

🟠

Likely Case

Device compromise leading to denial of service, unauthorized access to print jobs, and potential lateral movement within network.

🟢

If Mitigated

Limited to device disruption if network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - Directly exposed devices can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this to compromise devices and move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with network attack vector and no privileges required. Integer overflows often lead to RCE in embedded systems.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware versions after 2023-02-19

Vendor Advisory: https://publications.lexmark.com/publications/security-alerts/CVE-2023-26065.pdf

Restart Required: Yes

Instructions:

1. Check device firmware version via web interface or display panel. 2. Download latest firmware from Lexmark support site. 3. Upload firmware via web interface or USB. 4. Apply update and restart device. 5. Verify new firmware version.

🔧 Temporary Workarounds

Network segmentation

all

Isolate printers on separate VLAN with restricted access

Access control

all

Disable unnecessary services and restrict management interface access

🧯 If You Can't Patch

  • Remove devices from internet-facing networks immediately
  • Implement strict firewall rules to allow only necessary traffic to/from devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware date via web interface (Settings > Device Information) - if date is 2023-02-19 or earlier, device is vulnerable.

Check Version:

Check via web interface or device display panel under Settings > Device Information

Verify Fix Applied:

Confirm firmware date is after 2023-02-19 and version has been updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections to printer ports
  • Firmware modification attempts
  • Crash logs from printer services

Network Indicators:

  • Unexpected traffic to printer management ports (typically 80, 443, 9100)
  • Exploit pattern traffic to embedded web services

SIEM Query:

source_ip=printer_management_interface AND (status_code=500 OR bytes_transferred>threshold)

🔗 References

📤 Share & Export