CVE-2025-65079

N/A Unknown

📋 TL;DR

A heap-based buffer overflow vulnerability in the Postscript interpreter of Lexmark devices allows attackers to execute arbitrary code as an unprivileged user. This affects various Lexmark printer and multifunction devices that process Postscript files. Attackers could potentially gain control of affected devices.

💻 Affected Systems

Products:
  • Various Lexmark printers and multifunction devices
Versions: Specific versions not detailed in reference; check Lexmark advisory for affected models
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices must have Postscript capability enabled. Vulnerability triggered by processing malicious Postscript files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attacker to install persistent malware, pivot to internal networks, or use device as part of botnet.

🟠

Likely Case

Local privilege escalation leading to device control, data exfiltration from scanned documents, or denial of service.

🟢

If Mitigated

Limited impact if devices are isolated from internet and have strict network access controls.

🌐 Internet-Facing: HIGH if devices are directly exposed to internet via web interface or printing services.
🏢 Internal Only: MEDIUM as attackers would need internal network access, but could be exploited via malicious documents or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires ability to send Postscript files to device, which could be via print jobs, scanned documents, or web interface uploads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Lexmark security advisory for specific firmware versions

Vendor Advisory: https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html

Restart Required: Yes

Instructions:

1. Visit Lexmark security advisory page. 2. Identify affected device models. 3. Download latest firmware from Lexmark support portal. 4. Apply firmware update following manufacturer instructions. 5. Verify update completion and restart device.

🔧 Temporary Workarounds

Disable Postscript processing

all

Disable Postscript interpreter if not required for business needs

Check device web interface > Settings > Print Features > Disable Postscript

Network segmentation

all

Isolate printers on separate VLAN with restricted access

🧯 If You Can't Patch

  • Segment printers on isolated network segments with strict firewall rules
  • Implement print job auditing and monitor for suspicious Postscript file processing

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version against Lexmark advisory list

Check Version:

Access device web interface > Settings > About or use SNMP query: snmpget -v2c -c public <printer_ip> 1.3.6.1.2.1.25.6.3.1.2

Verify Fix Applied:

Verify firmware version matches or exceeds patched version from advisory

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed Postscript processing attempts
  • Unusual print job submissions
  • Firmware modification alerts

Network Indicators:

  • Unexpected network connections from printer
  • Postscript files sent to printer from unusual sources

SIEM Query:

source="printer_logs" AND (event="postscript_error" OR event="firmware_alert")

🔗 References

📤 Share & Export