CVE-2023-50739

8.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in Lexmark devices' Internet Printing Protocol (IPP) allows attackers to execute arbitrary code remotely. This affects various Lexmark printer models running vulnerable firmware versions. Organizations using these devices are at risk of compromise.

💻 Affected Systems

Products:
  • Various Lexmark printer models
Versions: Specific versions listed in Lexmark security advisory
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Check Lexmark advisory for specific affected models and firmware versions

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to network pivoting, data exfiltration, or ransomware deployment across connected systems.

🟠

Likely Case

Printer compromise enabling credential harvesting, network reconnaissance, or denial of service attacks.

🟢

If Mitigated

Limited impact with network segmentation and proper access controls preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network access to IPP service (typically port 631)

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates specified in Lexmark advisory

Vendor Advisory: https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html

Restart Required: Yes

Instructions:

1. Identify affected Lexmark models 2. Download latest firmware from Lexmark support portal 3. Apply firmware update following manufacturer instructions 4. Verify update completion

🔧 Temporary Workarounds

Network Segmentation

all

Isolate printers from critical networks and restrict IPP access

IPP Service Disablement

all

Disable Internet Printing Protocol if not required

🧯 If You Can't Patch

  • Implement strict network access controls to printer IPP ports
  • Monitor printer network traffic for anomalous IPP connections

🔍 How to Verify

Check if Vulnerable:

Check printer firmware version against Lexmark advisory list

Check Version:

Check printer web interface or use SNMP query for firmware version

Verify Fix Applied:

Confirm firmware version matches patched version in advisory

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed IPP connections
  • Unusual printer firmware activity

Network Indicators:

  • Anomalous traffic to printer port 631
  • Suspicious IPP payloads

SIEM Query:

destination_port:631 AND (protocol:ipp OR protocol:http) AND (anomalous_payload_size OR buffer_overflow_patterns)

🔗 References

📤 Share & Export