This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of PostScript data. Crafted PostScript data can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.
Affected Software | Affected Version | How to fix |
---|---|---|
Lexmark MC3224i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-15924 is critical, allowing arbitrary code execution without authentication.
To fix ZDI-CAN-15924, apply the latest firmware update provided by Lexmark for the MC3224i printer.
Organizations using Lexmark MC3224i printers are affected by ZDI-CAN-15924 and should take immediate action.
No, authentication is not required to exploit ZDI-CAN-15924, making it particularly dangerous.
ZDI-CAN-15924 allows network-adjacent attackers to execute arbitrary code on the affected printers.