CVE-2023-26067

8.1 HIGH

📋 TL;DR

CVE-2023-26067 is an input validation vulnerability in Lexmark device embedded web servers that allows remote code execution. Attackers can exploit this to execute arbitrary code on affected Lexmark printers and multi-function devices. Organizations using Lexmark devices with vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • Lexmark printers
  • Lexmark multi-function devices
Versions: All versions through 2023-02-19
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with embedded web server enabled are vulnerable. Exact model list should be verified with Lexmark advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to install persistent malware, steal sensitive data, pivot to internal networks, and disrupt printing operations.

🟠

Likely Case

Remote code execution leading to device takeover, data exfiltration, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH - Directly exposed devices can be exploited remotely without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised systems can exploit vulnerable devices on the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on Packet Storm. Exploitation appears straightforward based on available information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware versions after 2023-02-19

Vendor Advisory: https://publications.lexmark.com/publications/security-alerts/CVE-2023-26067.pdf

Restart Required: Yes

Instructions:

1. Check current firmware version on Lexmark devices. 2. Download latest firmware from Lexmark support portal. 3. Apply firmware update following manufacturer instructions. 4. Reboot devices after update completion.

🔧 Temporary Workarounds

Disable Embedded Web Server

all

Temporarily disable the embedded web server interface to prevent exploitation

Configure via device web interface: Settings > Network/Ports > Embedded Web Server > Disable

Network Segmentation

all

Isolate Lexmark devices to separate VLAN with restricted access

🧯 If You Can't Patch

  • Implement strict network access controls allowing only necessary traffic to Lexmark devices
  • Monitor device logs for suspicious web server activity and exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface: http://[device-ip]/settings or via device control panel

Check Version:

curl -s http://[device-ip]/settings | grep -i firmware

Verify Fix Applied:

Verify firmware version is newer than 2023-02-19 and test web server functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual web server requests
  • Multiple failed authentication attempts
  • Suspicious file uploads to device

Network Indicators:

  • Unexpected outbound connections from printers
  • Exploit pattern traffic to device web ports

SIEM Query:

source="lexmark-device" AND (url="*cgi*" OR method="POST" AND uri="*upload*")

🔗 References

📤 Share & Export