This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of PJL commands. The issue results from an exposed danagerous function, which can allow the creation of arbitrary files. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Lexmark MC3224i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-15820 has a high severity rating due to the potential for remote code execution without authentication.
To mitigate ZDI-CAN-15820, it is recommended to apply the latest firmware updates provided by Lexmark for the MC3224i printer.
ZDI-CAN-15820 affects installations of Lexmark MC3224i printers that have not been updated to the patched firmware.
Yes, ZDI-CAN-15820 can be exploited remotely by network-adjacent attackers due to insufficient input validation.
No, authentication is not required to exploit ZDI-CAN-15820, making it particularly dangerous for users.