CVE-2025-65081

N/A Unknown

📋 TL;DR

An out-of-bounds read vulnerability in the Postscript interpreter of Lexmark devices allows attackers to execute arbitrary code as an unprivileged user. This affects various Lexmark printers and multifunction devices that process Postscript files. Attackers could potentially gain control of affected devices through malicious Postscript files.

💻 Affected Systems

Products:
  • Various Lexmark printers and multifunction devices
Versions: Specific versions not provided in reference
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Postscript interpreter enabled. Exact model list requires checking Lexmark advisory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to connected networks, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain unprivileged user access, potentially leading to further exploitation or denial of service.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting isolated printer functionality.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending malicious Postscript files to vulnerable devices. No public exploit code known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Lexmark security advisory for specific firmware versions

Vendor Advisory: https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html

Restart Required: Yes

Instructions:

1. Visit Lexmark security advisory page
2. Identify affected device models
3. Download latest firmware from Lexmark support
4. Apply firmware update following manufacturer instructions
5. Reboot device after update

🔧 Temporary Workarounds

Disable Postscript processing

all

Disable Postscript interpreter if not required for business operations

Check device web interface > Settings > Print Features > Disable Postscript

Network segmentation

all

Isolate printers on separate VLAN with restricted access

🧯 If You Can't Patch

  • Implement strict network access controls to limit printer access to trusted users only
  • Monitor for suspicious Postscript file submissions and implement file type filtering

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Lexmark advisory. Devices with vulnerable Postscript interpreter are affected.

Check Version:

Check device web interface > Settings > About or use Lexmark device management tools

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in Lexmark advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual Postscript processing errors
  • Multiple failed print jobs with Postscript files
  • Unexpected device reboots

Network Indicators:

  • Unusual network traffic to printer ports (9100/tcp, 515/tcp)
  • Postscript files from unexpected sources

SIEM Query:

source="printer_logs" AND ("Postscript error" OR "memory violation" OR "out of bounds")

🔗 References

📤 Share & Export