Skip to Content Information Center
Lexmark T650

Lexmark T650

Lexmark Security Advisory: Stored Cross Site Scripting Vulnerabilities (CVE-2020-10093, CVE-2020-10094)

Lexmark Security Advisory:

Revision: 1.1
Last update: 20-April-2020
Public Release Date: 27-April-2020

Summary

A couple of stored cross site scripting vulnerabilities have been identified on older Lexmark devices.

References

CVE: CVE-2020-10093, CVE-2020-10094

Details

A couple of stored cross site scripting vulnerabilities have been identified in the embedded web server used in older Lexmark devices. The vulnerability can be used to attack the user’s browser, exposing session credentials and other information accessible to the browser.

CVE-2020-10093

CVSSv3 Base Score5.7(AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N)
Impact Subscore:3.6
Exploitability Subscore:2.1

CVE-2020-10094

CVSSv3 Base Score5.7(AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N)
Impact Subscore:3.6
Exploitability Subscore:2.1

CVSSv3 scores are calculated in accordance with CVSS version 3.1 (https://www.first.org/cvss/user-guide)

Impact

Successful exploitation of this vulnerability can lead to disclosure of information accessible to the browser.

Affected Products

CVE-2020-10093

This issue only affects discontinued products, including the Pro910 series inkjet. Currently supported devices are not vulnerable to this issue.

Lexmark recommends you replace any affected devices.

CVE-2020-10094

To determine a device's firmware level, select the Settings > Reports > Menu Setting Page menu item from the operator panel. If the firmware level listed under Device Information matches any level underAffected Releases, then upgrade to a Fixed Release.

Lexmark ModelsAffected ReleasesFixed Releases
CS31xLW74.VYL.P272 and previousLW74.VYL.P273 and later
CS41xLW74.VY2.P272 and previousLW74.VY2.P273 and later
CS51xLW74.VY4.P272 and previousLW74.VY4.P273 and later
CX310LW74.GM2.P272 and previousLW74.GM2.P273 and later
CX410 & XC2130LW74.GM4.P272 and previousLW74.GM4.P273 and later
CX510 & XC2132LW74.GM7.P272 and previousLW74.GM7.P273 and later
MS310, MS312, MS317LW74.PRL.P272 and previousLW74.PRL.P273 and later
MS410, M1140LW74.PRL.P272 and previousLW74.PRL.P273 and later
MS315, MS415, MS417LW74.TL2.P272 and previousLW74.TL2.P273 and later
MS51x, MS610dn, MS617LW74.PR2.P272 and previousLW74.PR2.P273 and later
M1145, M3150dnLW74.PR2.P272 and previousLW74.PR2.P273 and later
MS610de, M3150LW74.PR4.P272 and previousLW74.PR4.P273 and later
MS71x,M5163dnLW74.DN2.P272 and previousLW74.DN2.P273 and later
MS810, MS811, MS812, MS817, MS818LW74.DN2.P272 and previousLW74.DN2.P273 and later
MS810de, M5155, M5163LW74.DN4.P272 and previousLW74.DN4.P273 and later
MS812de, M5170LW74.DN7.P272 and previousLW74.DN7.P273 and later
MS91xLW74.SA.P272 and previousLW74.SA.P273 and later
MX31x, XM1135LW74.SB2.P272 and previousLW74.SB2.P273 and later
MX410, MX510 & MX511LW74.SB4.P272 and previousLW74.SB4.P273 and later
XM1140, XM1145LW74.SB4.P272 and previousLW74.SB4.P273 and later
MX610 & MX611LW74.SB7.P272 and previousLW74.SB7.P273 and later
XM3150LW74.SB7.P272 and previousLW74.SB7.P273 and later
MX71x, MX81xLW74.TU.P272 and previousLW74.TU.P273 and later
XM51xx & XM71xxLW74.TU.P272 and previousLW74.TU.P273 and later
MX91x & XM91xLW74.MG.P272 and previousLW74.MG.P273 and later
MX6500eLW74.JD.P272 and previousLW74.JD.P273 and later
C746LHS60.CM2.P737 and previousLHS60.CM2.P738 and later
C748, CS748LHS60.CM4.P737 and previousLHS60.CM4.P738 and later
C792, CS796LHS60.HC.P737 and previousLHS60.HC.P738 and later
C925LHS60.HV.P737 and previousLHS60.HV.P738 and later
C950LHS60.TP.P737 and previousLHS60.TP.P738 and later
X548 & XS548LHS60.VK.P737 and previousLHS60.VK.P738 and later
X74x & XS748LHS60.NY.P737 and previousLHS60.NY.P738 and later
X792 & XS79xLHS60.MR.P737 and previousLHS60.MR.P738 and later
X925 & XS925LHS60.HK.P737 and previousLHS60.HK.P738 and later
X95x & XS95xLHS60.TQ.P737 and previousLHS60.TQ.P738 and later
6500eLHS60.JR.P737 and previousLHS60.JR.P738 and later
C734LR.SK.P824 and previousLR.SK.P825 and later
C736LR.SKE.P824 and previousLR.SKE.P825 and later
E46xLR.LBH.P824 and previousLR.LBH.P825 and later
T65xLR.JP.P824 and previousLR.JP.P825 and later
X46xLR.BS.P824 and previousLR.BS.P825 and later
X65x LR.MN.P824 and previousLR.MN.P825 and later
X73xLR.FL.P824 and previousLR.FL.P825 and later
W850LP.JB.P823 and previousLP.JB.P824 and later
X86xLP.SP.P823 and previousLP.SP.P824 and later

Obtained Updated Software

To obtain firmware that resolves this issue or if you have special code, please contact Lexmark’s Technical Support Center at http://support.lexmark.com to find your local support center.

Workarounds

Lexmark recommends a firmware update if your device has affected firmware.

Exploitation and Public Announcements

Lexmark is not aware of any malicious use against Lexmark products of the vulnerability described in this advisory.

Lexmark would like to thank Tim Tepatti for bringing this issue to our attention.

Status of this Notice:

THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND IS PROVIDED WITHOUT ANY EXPRESS OR IMPLIED GUARANTEE OR WARRANTY WHATSOEVER, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR USE OR PURPOSE. LEXMARK RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

Distribution

This advisory is posted on Lexmark’s web site at http://support.lexmark.com/alerts Future updates to this document will be posted on Lexmark’s web site at the same location.

Revision History

RevisionDateReason
1.127 - April - 2020Initial Public Release

Top

LEGACY ID: TE936

Was this article helpful?
Top