CVE-2025-65080

N/A Unknown

📋 TL;DR

A type confusion vulnerability in the Postscript interpreter of Lexmark devices allows attackers to execute arbitrary code as an unprivileged user. This affects various Lexmark printers and multifunction devices that process Postscript files. Attackers could potentially gain control of affected devices through malicious Postscript files.

💻 Affected Systems

Products:
  • Various Lexmark printers and multifunction devices
Versions: Specific versions not yet detailed in public advisory
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with Postscript interpreter enabled are vulnerable. Check Lexmark security advisory for specific model list.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attacker to install persistent malware, pivot to internal networks, exfiltrate data, or use device as part of botnet

🟠

Likely Case

Local privilege escalation leading to unauthorized access to device functions, configuration changes, or data stored on device memory

🟢

If Mitigated

Limited impact if network segmentation prevents device access and Postscript processing is disabled

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending malicious Postscript files to vulnerable devices. No public exploit code available yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Lexmark security advisory for specific firmware versions

Vendor Advisory: https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html

Restart Required: Yes

Instructions:

1. Visit Lexmark security advisory page 2. Identify affected device models 3. Download latest firmware from Lexmark support 4. Apply firmware update following manufacturer instructions 5. Reboot device

🔧 Temporary Workarounds

Disable Postscript Processing

all

Disable Postscript interpreter if not required for business operations

Network Segmentation

all

Isolate printers on separate VLAN with restricted access

🧯 If You Can't Patch

  • Implement strict network access controls to prevent unauthorized access to printer management interfaces
  • Monitor for suspicious Postscript file transfers to printer devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against patched versions in Lexmark advisory

Check Version:

Check printer web interface or control panel for firmware version

Verify Fix Applied:

Confirm firmware version matches or exceeds patched version listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual Postscript file processing errors
  • Multiple failed print jobs with Postscript files
  • Unexpected device reboots

Network Indicators:

  • Unusual network traffic to printer ports (9100/tcp, 515/tcp)
  • Postscript files from unexpected sources

SIEM Query:

source="printer_logs" AND (event="postscript_error" OR event="firmware_crash")

🔗 References

📤 Share & Export