This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the processing of packet captures. When parsing the filter property, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the www-data user.
Affected Software | Affected Version | How to fix |
---|---|---|
Lexmark MC3224i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-15894 is classified as a high-severity vulnerability due to its ability to allow arbitrary code execution.
To fix ZDI-CAN-15894, update your Lexmark MC3224i printers with the latest firmware provided by Lexmark.
ZDI-CAN-15894 affects installations of Lexmark MC3224i printers that have the vulnerability present.
Attackers can potentially execute arbitrary code on affected Lexmark MC3224i printers if they successfully bypass authentication.
No, while authentication is required, the vulnerability allows this mechanism to be bypassed, making it insecure.