CVE-2023-50733

8.6 HIGH

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in newer Lexmark devices' Web Services feature. It allows attackers to make the device send unauthorized requests to internal network resources. Organizations using affected Lexmark printers and multifunction devices are at risk.

💻 Affected Systems

Products:
  • Lexmark printers and multifunction devices with Web Services feature
Versions: Specific versions not detailed in provided reference; check Lexmark advisory for exact affected models/versions
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects newer Lexmark devices with Web Services enabled; older models without this feature are not vulnerable

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could pivot through the vulnerable device to access internal systems, steal sensitive data, or perform internal network reconnaissance leading to further compromise.

🟠

Likely Case

Attackers scanning for vulnerable devices to map internal networks, access internal web applications, or interact with internal APIs.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the printer's local network segment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

SSRF typically requires some level of access to the web interface; complexity depends on authentication requirements

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Lexmark security advisory for specific firmware versions

Vendor Advisory: https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html

Restart Required: No

Instructions:

1. Visit Lexmark security advisory page. 2. Identify affected device models. 3. Download latest firmware from Lexmark support. 4. Apply firmware update following manufacturer instructions.

🔧 Temporary Workarounds

Disable Web Services

all

Turn off the Web Services feature on affected Lexmark devices

Network Segmentation

all

Place Lexmark devices on isolated network segments with restricted outbound access

🧯 If You Can't Patch

  • Implement strict network access controls to prevent devices from reaching sensitive internal resources
  • Monitor device network traffic for unusual outbound connections to internal IPs

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Lexmark's advisory; test if Web Services accepts SSRF payloads

Check Version:

Check device web interface or printed configuration page for firmware version

Verify Fix Applied:

Verify firmware version is updated to patched version; test SSRF attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests from printer IPs to internal systems
  • Failed authentication attempts on printer web interface

Network Indicators:

  • Printer devices making unexpected HTTP/HTTPS requests to internal IP ranges
  • Outbound connections from printers to non-standard ports

SIEM Query:

source_ip IN (printer_ips) AND dest_ip IN (internal_subnets) AND protocol IN (http, https)

🔗 References

📤 Share & Export