Critical vulnerabilities in Lexmark printers

B2B Cyber ​​Security ShortNews

Share post

The manufacturer of corporate printers Lexmark has once again warned its users of critical vulnerabilities. In dozens of its models there are four vulnerabilities in the firmware with a CVSSv3 score of 9.0, one 8.5 and one 8.0 out of 10. Users should update the firmware accordingly.

A few weeks ago, Lexmark had to ask many of its users to update the firmware for many of its printers. Now there is already a large number of dangerous vulnerabilities. The update is recommended for companies and administrators because the CVSSv3 values ​​are 9.0 out of 10 in four cases and are considered critical. The other vulnerabilities are at 8.5 and 8.0 and are classified as highly dangerous.

  • Postscript buffer overflow (type confusion) (CVE-2023-26063)
    A security vulnerability has been discovered in the Postscript interpreter of various Lexmark devices.
  • Postscript buffer overflow (write out of bounds) (CVE-2023-26064)
    A security vulnerability in the Postscript interpreter has been found in various Lexmark devices.
  • Postscript buffer overflow (integer overflow) (CVE-2023-26065)
    A security vulnerability in the Postscript interpreter has been found in various Lexmark devices.
  • Postscript buffer overflow (improper stack validation) (CVE-2023-26066)
    A security vulnerability in the Postscript interpreter has been found in various Lexmark devices.
  • Vulnerability in input validation (CVE-2023-26067)
    An input validation vulnerability that could allow an attacker who has already compromised an affected Lexmark device to escalate their privileges.

Very long device lists

The device lists affected by the vulnerabilities are long. Sometimes there are dozens of devices and sometimes more than a hundred models. Unfortunately, the manufacturer only lists the devices within the PDF files for the vulnerability. To be on the safe side, you should search these lists for your models.

More at Lexmark.com

 

Matching articles on the topic

Quantum-safe encryption

A provider of solutions that seamlessly extend Privileged Access Management (PAM) now offers effective protection against threats ➡ Read more

New Russian malware Kapeka discovered

The security experts at WithSecure have exposed Kapeka. The new malware appears to have ties to the Russian hacker group Sandworm. Several factors ➡ Read more

Lancom LCOS with root password vulnerability 

Lancom and the BSI report a configuration bug for the LCOS operating system: A vulnerability with the CVSS value of 6.8 can ➡ Read more

XenServer and Citrix Hypervisor vulnerabilities

Citrix warns of two vulnerabilities in XenServer and Citrix Hypervisor. The security vulnerabilities are only moderately serious, but there is still one ➡ Read more

Successful phishing: Attackers attack MFA service providers for Cisco Duo 

Cisco calls its Zero Trust security platform “Duo” for short. Their access is protected by state-of-the-art multi-factor authentication (MFA). Through a ➡ Read more

North Korean state hackers are relying on new espionage tactics

First talk, then hack: The North Korean hacker group TA427 tries to address foreign policy experts in a rather unspectacular way in order to get their point of view ➡ Read more

Disinformation campaigns from China

The report that China is allegedly disrupting and manipulating elections by using AI-generated content to spread disinformation should not be ➡ Read more

OT security status report

A recent survey of industrial companies worldwide – including Germany – paints a worrying picture about the state of OT security ➡ Read more