CVE-2023-40239

7.5 HIGH
XXE

📋 TL;DR

This vulnerability in certain Lexmark devices allows XML External Entity (XXE) attacks, which can lead to information disclosure by reading files from the device's filesystem. It affects Lexmark devices like the CS310 series running firmware versions before LW80.*.P246. Organizations using these vulnerable printer/MFP devices are at risk.

💻 Affected Systems

Products:
  • Lexmark CS310 series and other unspecified Lexmark devices
Versions: All firmware versions before LW80.*.P246
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The '*' in the version indicates variation across product families, but all require firmware level P246 or higher for remediation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could read sensitive files from the device's filesystem, potentially obtaining configuration files, credentials, or other sensitive data stored on the device.

🟠

Likely Case

Information disclosure of device configuration files, potentially revealing network settings or other operational data.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XXE vulnerabilities typically have low exploitation complexity and can be exploited without authentication if the vulnerable endpoint is exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: LW80.*.P246 or higher

Vendor Advisory: https://publications.lexmark.com/publications/security-alerts/CVE-2023-40239.pdf

Restart Required: Yes

Instructions:

1. Identify affected Lexmark devices. 2. Download firmware version LW80.*.P246 or higher from Lexmark support portal. 3. Upload and install the firmware update via the device web interface. 4. Reboot the device after installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Lexmark devices on separate network segments with restricted access

Access Control Lists

all

Implement firewall rules to restrict access to device management interfaces

🧯 If You Can't Patch

  • Segment vulnerable devices on isolated network segments with strict access controls
  • Disable unnecessary services and interfaces on affected devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface at http://[device-ip]/settings

Check Version:

curl -s http://[device-ip]/settings | grep -i firmware

Verify Fix Applied:

Verify firmware version shows LW80.*.P246 or higher in device settings

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors in device logs
  • Multiple failed XML processing attempts

Network Indicators:

  • Unusual XML payloads sent to device management interfaces
  • External entity references in XML requests

SIEM Query:

source="lexmark-device" AND (message="XML" OR message="XXE" OR message="external entity")

🔗 References

📤 Share & Export