TL;DR

Lexmark CX532adwe printer suffers from an unauthenticated remote code execution vulnerability through getCFFNames API's heap-based buffer overflow, allowing network-adjacent attackers to execute arbitrary code without user interaction.

What happened

['Network-adjacent attackers can exploit a heap-based buffer overflow in the Lexmark CX532adwe printer via the getCFFNames API', 'This vulnerability does not require authentication to be exploited']

Why it matters for ops

['Critical network devices like printers should not have exploitable vulnerabilities', 'Remote code execution can lead to full control over the device and potentially lateral movement within a network']

Mitigation

  • Apply vendor-provided security patches immediately upon release
  • Segregate printer networks if possible and enforce strict access control policies

Action items

  • Review network segmentation for critical devices like Lexmark CX532adwe
  • Implement or update Intrusion Detection Systems to monitor for suspicious getCFFNames API activity

Detection IOCs

  • Unexpected HTTP requests to getCFFNames endpoint with large payloads
  • Unusual network traffic from printers to unknown IP addresses

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-066/