Page 4 of 70 results (0.005 seconds)

CVSS: 8.1EPSS: 0%CPEs: 240EXPL: 0

Various Lexmark products through 2022-04-27 allow an attacker who has already compromised an affected Lexmark device to maintain persistence across reboots. Varios productos de Lexmark hasta el 2022-04-27 permiten a un atacante que ya ha comprometido un dispositivo Lexmark afectado mantener la persistencia a través de los reinicios • https://publications.lexmark.com/publications/security-alerts/CVE-2022-29850.pdf https://support.lexmark.com/alerts https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html • CWE-20: Improper Input Validation CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

Lexmark products through 2022-02-10 have Incorrect Access Control. Los productos de Lexmark versiones hasta 10-02-2022, presentan un Control de Acceso Incorrecto This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware upgrade feature. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. • https://lexmark.com https://publications.lexmark.com/publications/security-alerts/CVE-2022-24935.pdf • CWE-306: Missing Authentication for Critical Function •

CVSS: 10.0EPSS: 2%CPEs: 472EXPL: 0

Embedded web server input sanitization vulnerability in Lexmark devices through 2021-12-07, which can which can lead to remote code execution on the device. Una vulnerabilidad en el saneo de entradas del servidor web integrado en los dispositivos Lexmark versiones hasta 07-12-2021, que puede conllevar a una ejecución de código remota en el dispositivo This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HTTP server. The issue results from the lack of proper validation of a user-supplied string before using it to write to a configuration file. An attacker can leverage this vulnerability to execute code in the context of the www-data user. • https://support.lexmark.com/alerts https://www.zerodayinitiative.com/advisories/ZDI-22-332 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

The initial admin account setup wizard on Lexmark devices allow unauthenticated access to the “out of service erase” feature. El asistente de configuración inicial de la cuenta de administrador en los dispositivos Lexmark permite el acceso no autenticado a la funcionalidad "out of service erase" This vulnerability allows remote attackers to remove authentication on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within URL handling. The issue results from the lack of proper restriction to a URL. An attacker can leverage this vulnerability to execute code in the context of root. • https://support.lexmark.com/alerts https://www.zerodayinitiative.com/advisories/ZDI-22-331 • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 3%CPEs: 240EXPL: 0

Embedded web server command injection vulnerability in Lexmark devices through 2021-12-07. Una vulnerabilidad de inyección de comandos del servidor web integrado en los dispositivos Lexmark versiones hasta 07-12-2021 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the processing of packet captures. When parsing the filter property, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the www-data user. • https://support.lexmark.com/alerts https://www.zerodayinitiative.com/advisories/ZDI-22-326 https://www.zerodayinitiative.com/advisories/ZDI-22-329 https://www.zerodayinitiative.com/advisories/ZDI-22-330 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •