CVE-2023-26070

9.8 CRITICAL

📋 TL;DR

This CVE describes an input validation vulnerability in certain Lexmark devices that could allow remote attackers to execute arbitrary code or cause denial of service. The vulnerability affects Lexmark devices with firmware versions through February 19, 2023. Organizations using affected Lexmark printers and multifunction devices are at risk.

💻 Affected Systems

Products:
  • Lexmark printers and multifunction devices
Versions: Firmware versions through 2023-02-19
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Specific device models not detailed in public advisory; check Lexmark's security alert for complete list.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains full control of the device, potentially pivoting to internal networks or deploying ransomware.

🟠

Likely Case

Remote code execution leading to device compromise, data exfiltration, or disruption of printing services.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only denial of service.

🌐 Internet-Facing: HIGH - CVSS 9.8 indicates critical risk for internet-exposed devices.
🏢 Internal Only: HIGH - Even internally, vulnerable devices could be exploited via phishing or compromised internal hosts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 suggests low attack complexity; no public exploit code known at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware versions after 2023-02-19

Vendor Advisory: https://publications.lexmark.com/publications/security-alerts/CVE-2023-26070.pdf

Restart Required: Yes

Instructions:

1. Visit Lexmark support site. 2. Identify your device model. 3. Download latest firmware. 4. Apply firmware update via web interface or USB. 5. Reboot device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Lexmark devices to separate VLAN with restricted access.

Disable Unnecessary Services

all

Turn off unused network services on printer web interface.

🧯 If You Can't Patch

  • Implement strict network access controls to limit device exposure
  • Monitor device logs for suspicious activity and implement IDS/IPS rules

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device web interface under Settings > General Settings > Device Information

Check Version:

N/A for embedded devices; use web interface or SNMP query

Verify Fix Applied:

Verify firmware version is newer than 2023-02-19 in device information page

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to printer web interface
  • Firmware modification attempts
  • Unexpected device reboots

Network Indicators:

  • Suspicious traffic to printer ports (80, 443, 9100)
  • Unusual outbound connections from printer

SIEM Query:

source="lexmark-printer" AND (event_type="firmware_change" OR http_status="500" OR http_method="POST" AND uri_contains("config"))

🔗 References

📤 Share & Export