Page 3 of 15 results (0.021 seconds)

CVSS: 8.1EPSS: 0%CPEs: 240EXPL: 0

Various Lexmark products through 2022-04-27 allow an attacker who has already compromised an affected Lexmark device to maintain persistence across reboots. Varios productos de Lexmark hasta el 2022-04-27 permiten a un atacante que ya ha comprometido un dispositivo Lexmark afectado mantener la persistencia a través de los reinicios • https://publications.lexmark.com/publications/security-alerts/CVE-2022-29850.pdf https://support.lexmark.com/alerts https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html • CWE-20: Improper Input Validation CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 10.0EPSS: 2%CPEs: 472EXPL: 0

Embedded web server input sanitization vulnerability in Lexmark devices through 2021-12-07, which can which can lead to remote code execution on the device. Una vulnerabilidad en el saneo de entradas del servidor web integrado en los dispositivos Lexmark versiones hasta 07-12-2021, que puede conllevar a una ejecución de código remota en el dispositivo This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HTTP server. The issue results from the lack of proper validation of a user-supplied string before using it to write to a configuration file. An attacker can leverage this vulnerability to execute code in the context of the www-data user. • https://support.lexmark.com/alerts https://www.zerodayinitiative.com/advisories/ZDI-22-332 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 2%CPEs: 240EXPL: 0

Embedded web server command injection vulnerability in Lexmark devices through 2021-12-07. Una vulnerabilidad de inyección de comandos del servidor web integrado en los dispositivos Lexmark versiones hasta 07-12-2021 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the processing of packet captures. When parsing the filter property, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the www-data user. • https://support.lexmark.com/alerts https://www.zerodayinitiative.com/advisories/ZDI-22-326 https://www.zerodayinitiative.com/advisories/ZDI-22-329 https://www.zerodayinitiative.com/advisories/ZDI-22-330 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 472EXPL: 0

PJL directory traversal vulnerability in Lexmark devices through 2021-12-07 that can be leveraged to overwrite internal configuration files. Una vulnerabilidad de salto de directorios PJL en dispositivos Lexmark versiones hasta 07-12-2021 que puede ser aprovechada para sobrescribir archivos de configuración internos This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of PJL commands. The issue results from an exposed danagerous function, which can allow the creation of arbitrary files. An attacker can leverage this vulnerability to execute code in the context of root. • https://support.lexmark.com/alerts https://www.zerodayinitiative.com/advisories/ZDI-22-333 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 10.0EPSS: 6%CPEs: 472EXPL: 0

Buffer overflow vulnerability has been identified in Lexmark devices through 2021-12-07 in postscript interpreter. Se ha identificado una vulnerabilidad de desbordamiento del búfer en los dispositivos Lexmark versiones hasta 07-12-2021, en el intérprete de postscript This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of PostScript data. Crafted PostScript data can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://support.lexmark.com/alerts https://www.zerodayinitiative.com/advisories/ZDI-22-327 https://www.zerodayinitiative.com/advisories/ZDI-22-328 https://www.zerodayinitiative.com/advisories/ZDI-22-382 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •