This vulnerability allows local attackers to escalate privileges on affected installations of Lexmark MC3224i printers. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the permissions set on root-owned service files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Lexmark Mc3224i Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-15895 is considered high due to the potential for privilege escalation.
To fix ZDI-CAN-15895, update the firmware of Lexmark MC3224i printers to the latest version provided by Lexmark.
ZDI-CAN-15895 affects Lexmark MC3224i printer installations that allow local code execution.
ZDI-CAN-15895 can enable local attackers to escalate privileges, potentially allowing unauthorized access to sensitive functions.
No, remote access is not required; an attacker must have local access to execute low-privileged code to exploit ZDI-CAN-15895.