This vulnerability allows remote attackers to remove authentication on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within URL handling. The issue results from the lack of proper restriction to a URL. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Lexmark Mc3224i Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-15800 is critical due to its potential for remote exploitation without authentication.
To fix ZDI-CAN-15800, update the firmware of the Lexmark MC3224i printer to the latest version provided by the manufacturer.
ZDI-CAN-15800 specifically affects Lexmark MC3224i printers.
Yes, ZDI-CAN-15800 can be exploited remotely by attackers without needing to authenticate.
The nature of the vulnerability in ZDI-CAN-15800 involves improper URL handling that allows remote attackers to bypass authentication.