CVE-2025-4044

8.2 HIGH
XXE

📋 TL;DR

This XXE vulnerability in Lexmark printer drivers allows attackers to read sensitive files from Windows systems and exfiltrate them to arbitrary URLs. Organizations using affected Lexmark printer drivers on Windows are vulnerable to data theft.

💻 Affected Systems

Products:
  • Lexmark printer drivers for Windows
Versions: Specific versions not detailed in advisory; check Lexmark security page for affected models
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows systems with vulnerable Lexmark printer drivers installed. Check Lexmark advisory for specific driver versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive files including credentials, configuration files, and system data, with exfiltration to attacker-controlled servers.

🟠

Likely Case

Theft of printer configuration files, network credentials, and local system files accessible to the printer driver process.

🟢

If Mitigated

Limited file access restricted by process permissions and network egress controls.

🌐 Internet-Facing: LOW (requires local access or network access to printer driver interface)
🏢 Internal Only: MEDIUM (requires internal network access to vulnerable printer drivers)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to send malicious XML to the printer driver interface. Typically requires network access to printer management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Lexmark security advisory for specific patched driver versions

Vendor Advisory: https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html

Restart Required: Yes

Instructions:

1. Visit Lexmark security advisory page. 2. Identify affected printer models. 3. Download and install updated printer drivers. 4. Restart affected systems.

🔧 Temporary Workarounds

Disable XML external entity processing

windows

Configure printer drivers to disable XXE processing if supported

Network segmentation

all

Isolate printer management interfaces from untrusted networks

🧯 If You Can't Patch

  • Restrict network access to printer management interfaces using firewall rules
  • Monitor for unusual outbound connections from printer driver processes

🔍 How to Verify

Check if Vulnerable:

Check installed Lexmark printer driver versions against advisory. Use: Get-PrinterDriver -Name '*Lexmark*' in PowerShell

Check Version:

Get-PrinterDriver -Name '*Lexmark*' | Select-Object Name, DriverVersion

Verify Fix Applied:

Verify driver version matches patched version from Lexmark advisory and test XXE functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors in printer logs
  • Printer driver process making unexpected outbound connections

Network Indicators:

  • HTTP/HTTPS requests from printer driver processes to unusual external domains
  • XML payloads sent to printer management interfaces

SIEM Query:

source="printer_logs" AND ("XML parse error" OR "external entity") OR dest_ip=printer_ip AND protocol=http AND content="<!ENTITY"

🔗 References

📤 Share & Export