This site uses cookies for various purposes including enhancing your experience, analytics, and ads. By continuing to browse this site or by clicking "Accept and close", you agree to our use of cookies. For more information, read our Cookies page.

Lexmark Security Advisories

Lexmark’s ultimate goal is to produce software and hardware that is free from security-related vulnerabilities, however, the sheer complexity of the code in the products results in the need to be able to address security-related issues in released products. Lexmark’s software and hardware products contain hundreds of files, thousands of objects, and tens of millions of lines of code and a product that was released with no known vulnerabilities may indeed have new vulnerabilities identified over time. This can be due to a previously unidentified vulnerability found in custom code written by Lexmark, in a common shared system library, or in a third-party library integrated into the Lexmark software or firmware. Lexmark’s security staff and experts monitor multiple channels for the identification of new security vulnerabilities including: internal review, customer service, security-focused press, security-related academic research, and technical alerts from organizations like NIST-National Vulnerability Database and US-Computer Emergency Readiness Team (US-CERT). Additionally, Lexmark uses scanning tools during the implementation phase that scan source code for out-ofdate or vulnerable shared libraries.

When new vulnerabilities are identified which might affect Lexmark’s products, they are addressed via the following process:

1. The vulnerability is analyzed to determine if it affects the product. (Vulnerabilities found in shared system or third-party code libraries may not apply, depending on the way the code is used in the system).

2. Lexmark’s security staff determines if the exploit mechanism for the vulnerability is possible in Lexmark’s implementation.

3. If yes, then the security bug is scored using industry standard Common Vulnerability Scoring Systems (CVSS). Note: The severity score published in a technical alert may score differently in specific implementations.

4. Internal processes are initiated to log, track, patch, and test the bug fix, and updated code is provided via a patch process.

5. If the CVSS score warrants, Lexmark will issue a security advisory for the products affected.

Submitting an issue

For product security vulnerabilities affecting Lexmark printers, send an e-mail to securityalerts@lexmark.com.

You may use Lexmark's PGP key to encrypt sensitive information (Click here to download our PGP public key).   Please also include your PGP key so we may communicate with you on sensitive issues.

KRACK Vulnerabilities (CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, and CVE-2017-13088)

Lexmark has learned of a series of weaknesses in WPA2, the protocol that secures all modern protected WiFi networks. This vulnerability can allow the disclosure of information that was assumed to be safely encrypted.

Pivotal Spring-LDAP vulnerability (CVE-2017-8028)

Markvision Enterprise contains a vulnerability when configured to use TLS binding for LDAP that allows clients to logon with a valid username and any arbitrary password.

Spectre and Meltdown Vulnerabilities (CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754)

Some Lexmark products may contain CPUs that are affected by the speculative execution vulnerabilities known as Spectre (CVE-2017-5753 and CVE-2017-5715) and Meltdown (CVE-2017-5754) .  However, there is no known path to exploit these vulnerabilities on a Lexmark device.

Orpheus' Lyre Vulnerability (CVE-2017-11103)

A vulnerability in Heimdal (an implementation of Kerberos 5) before release 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification.

WannaCry Ransomware Vulnerability ( CVE-2017-0143 )

Lexmark devices are not vulnerable to WannaCry ransomware or to the following associated exploits: EternalBlue, EternalSynery, EternalRomance, EternalChampion. This attack propagates through Microsoft SMBv1 servers.

XLS parsing buffer overflow vulnerability (CVE-2016-4335)

A vulnerability was discovered in the XLS parsing function that provides the potential for an attacker to execute arbitrary code on an affected devices.

Arbitrary code execution vulnerabilities in Lexmark Perceptive Document Filters (CVE-2016-5646, CVE-2016-4336, CVE-2016-4335)

Lexmark has learned of three separate vulnerabilities in Lexmark Perceptive Document Filters that, under certain circumstances, could lead to arbitrary code execution.

Out of Service Memory Erase Failure (CVE-2016-3145)

Under certain circumstances some Lexmark printers will fail to erase stored information when requested.

Markvision Java Serialization Vulnerability (CVE-2016-1487)

Markvision Enterprise contains a vulnerability that allows for unauthenticated remote execution of commands on the MVE server.

Race Condition During Initialization (CVE-2016-1896)

Under certain circumstances during initialization, some Lexmark printers have a race condition that allows unauthenticated access to device functions.

Logjam Vulnerability in Diffie-Hellman Key Exchange (CVE-2015-4000)

Lexmark has learned of a vulnerability on some implementations of the SSL/TLS protocol that allows an attacker to compromise the communicators over that protocol.

FREAK: Factoring Attack on RSA-Export Vulnerability (CVE-2015-0204)

Lexmark has learned of a vulnerability in some implementations of the SSL/TLS protocol that allows an attacker to compromise communications over that protocol.

GHOST Glibc Buffer Overflow Vulnerability (CVE-2015-0235)

Lexmark has learned of a vulnerability in the "glibc" library that provides the potential for an attacker to execute arbitrary code on an affected system.

Markvision Input Validation Vulnerability (CVE-2014-9375)

Markvision Enterprise contains a vulnerability that allows uploaded ZIP files to be unpacked into arbitrary locations.

Markvision Remote Code Execution Vulnerability (CVE-2014-8741)

MarkVision Enterprise contains a vulnerability that allows an unauthenticated remote attacker to upload files and execute arbitrary commands with the privilege of the MarkVision Enterprise application.

Markvision Input Validation Vulnerability (CVE-2014-8742)

MarkVision Enterprise contains a vulnerability that allows an unauthenticated remote attacker to download arbitrary files from the MarkVision Enterprise platform.

POODLE Vulnerability (CVE-2014-3566)

Lexmark has learned of a vulnerability in the SSLv3 protocol which allows an attacker with the ability to intercept and insert traffic (Man-In-The-Middle) to decrypt a portion of the encrypted communication.

Bash "shellshock" Vulnerabilities (CVE-2014-6271)

Lexmark has learned of a series of vulnerabilities in the open-source bash shell program that allows an attacker to execute arbitrary commands on a vulnerable system. No Lexmark devices or software products are affected by this vulnerability.

Open SSL CCS Injection Vulnerability (CVE-2014-0224)

Lexmark has learned of a group of vulnerabilities in certain versions of the open-source OpenSSL library that can be exploited by a Man-In-The-Middle attack. Multiple Lexmark products are affected by this vulnerability.

Open SSL Heartbleed Vulnerability (CVE-2014-0160)

Lexmark has learned of a vulnerability in certain versions of the open-source OpenSSL Library that allows unauthenticated access to private memory of printer devices and computer systems. Multiple Lexmark products are affected by this vulnerability.

HTML injection vulnerability (CVE-2013-6033)

Some Lexmark Printers do not properly sanitize user supplied values for the "Contact" and "Location" settings. This vulnerability can be exploited to execute arbitrary HTML or script code in the browser of anyone viewing the devices embedded web server.

Password Reset vulnerability (CVE-2013-6032)

Some Lexmark Printers and MarkNet devices will fail to authenticate a specially crafted password reset request. This vulnerability can be exploited to bypass authentication configured on the device.

Markvision Unauthorized access vulnerability (CVE-2013-3055)

Markvision Enterprise contains a vulnerability that allows an unauthenticated remote attacker to access and modify configuration data and fleet management information, in addition to executing commands within the application.

Information leakage vulnerability (CVE-2011-4538)

Some Lexmark Multifunction Devices include sensitive configuration values in exported settings files. This vulnerability can be exploited to enable unauthorized disclosure of device configuration information.

Email shortcut vulnerability Security Vulnerability (CVE-2011-3269)

Some Lexmark Multifunction Devices allow the creation of email shortcuts that contain hidden recipients. This vulnerability can be exploited to enable unauthorized personnel to receive a covert copy of email sent by the device using the modified shortcut.

PJL Remote Buffer Overflow Security Vulnerability (CVE-2010-0619)

Some Lexmark Laser Printers contain remote buffer overflow vulnerabilities in their PJL processing functionality. These vulnerabilities could potentially lead to remote code execution,but no malicious use of this vulnerability is known.

FTP Denial of Service Security Vulnerability (CVE-2010-0618)

Some Lexmark Printers and MarkNet devices contain denial of service vulnerabilities in the FTP service. These vulnerabilities can be exploited with repeated aborted FTP connections to the printer, causing the printer to ignore incoming TCP network connections to multiple services.

HTTP Denial of service vulnerability (CVE-2010-0101)

Some Lexmark Printers and MarkNet Devices contain a denial of service vulnerability in their HTTP service. This vulnerability can be exploited to crash the printer.

SSL Denial of service vulnerability(CVE-2004-0079)

Some Lexmark Printers and MarkNet Devices contain a denial of service vulnerability in their SSL/TLS processing. This vulnerability can be exploited to crash the printer.