Advisory Details

May 17th, 2023

(Pwn2Own) Lexmark MC3224i fax_change_faxtrace_setting Command Injection Remote Code Execution Vulnerability

ZDI-23-668
ZDI-CAN-19470

CVE ID CVE-2023-26067
CVSS SCORE 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Lexmark
AFFECTED PRODUCTS MC3224i
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the fax_change_faxtrace_settings script. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the httpd user.

ADDITIONAL DETAILS Lexmark has issued an update to correct this vulnerability. More details can be found at:
https://publications.lexmark.com/publications/security-alerts/CVE-2023-26067.pdf
DISCLOSURE TIMELINE
  • 2022-12-28 - Vulnerability reported to vendor
  • 2023-05-17 - Coordinated public release of advisory
CREDIT James Horseman and Zach Hanley of Horizon3 A.I.
BACK TO ADVISORIES