Skip to Content Information Center
Lexmark X746

Lexmark X746

Lexmark Security Advisory: Cross Site Request Forgery (CVE-2019-10057)

Lexmark Security Advisory:

Revision: 1.0
Last update: 10 May 2019
Public Release Date: 20 May 2019

Summary

Many older Lexmark devices embedded web server contain a cross site request forgery attack vulnerability that allows a local account password to be changed without the knowledge of the authenticated user.

References

CVE: CVE-2019-10057

Details

A vulnerability has been identified in the embedded web server used in older generation Lexmark devices. The vulnerability allows an attacker to fool an authenticated user into changing their password.

CVSSv3 Base Score6.5(AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)
Impact Subscore:3.6
Exploitability Subscore:2.8

CVSSv3 scores are calculated in accordance with CVSS version 3.0 (https://www.first.org/cvss/user-guide)

Impact

Successful exploitation of this vulnerability can lead to the takeover of a local account on the device.

Affected Products

To determine a devices firmware level, select the “Settings”->“Reports”->”Menu Setting Page” menu item from the operator panel. If the firmware level listed under “Device Information” matches any level under “Affected Releases”, then upgrade to a “Fixed Release”.

Lexmark ModelsAffected ReleasesFixed Releases
CS31xLW71.VYL.P228 and laterLW71.VYL.P229 and later
CS41xLW71.VY2.P228 and laterLW71.VY2.P229 and later
CX310LW71.GM2.P228 and laterLW71.GM2.P229 and later
MS310, MS312, MS317LW71.PRL.P228 and laterLW71.PRL.P229 and later
MS410, M1140LW71.PRL.P228 and laterLW71.PRL.P229 and later
MS315, MS415, MS417LW71.TL2.P228 and laterLW71.TL2.P229 and later
MX31x, XM1135LW71.SB2.P228 and laterLW71.SB2.P229 and later
MS51x, MS610dn, MS617LW71.PR2.P228 and laterLW71.PR2.P229 and later
M1145, M3150dnLW71.PR2.P228 and laterLW71.PR2.P229 and later
MS71x, M5163dnLW71.DN2.P228 and laterLW71.DN2.P229 and later
MS810, MS811, MS812, MS817, MS818LW71.DN2.P228 and laterLW71.DN2.P229 and later
CS51xLW63.VY4.P683 and previousLW63.VY4.P684 and later
CX410 & XC2130LW63.GM4.P683 and previousLW63.GM4.P684 and later
CX510 & XC2132LW63.GM7.P683 and previousLW63.GM7.P684 and later
MS610de, M3150LW63.PR4.P683 and previousLW63.PR4.P684 and later
MS810de, M5155, M5163LW63.DN4.P683 and previousLW63.DN4.P684 and later
MS812de, M5170LW63.DN7.P683 and previousLW63.DN7.P684 and later
MS91xLW63.SA.P683 and previousLW63.SA.P684 and later
MX31x, XM1135LW63.SB2.P683 and previousLW63.SB2.P684 and later
MX410, MX510 & MX511LW63.SB4.P683 and previousLW63.SB4.P684 and later
XM1140, XM1145LW63.SB4.P683 and previousLW63.SB4.P684 and later
MX610 & MX611LW63.SB7.P683 and previousLW63.SB7.P684 and later
XM3150LW63.SB7.P683 and previousLW63.SB7.P684 and later
MX71x, MX81xLW63.TU.P683 and previousLW63.TU.P684 and later
XM51xx & XM71xxLW63.TU.P683 and previousLW63.TU.P684 and later
MX91x & XM91xLW63.MG.P683 and previousLW63.MG.P684 and later
MX6500eLW63.JD.P683 and previousLW63.JD.P684 and later
C746LHS42.CM2.P573 and previousLHS42.CM2.P574 and later
C748, CS748LHS42.CM4.P573 and previousLHS42.CM4.P574 and later
C792, CS796LHS42.HC.P573 and previousLHS42.HC.P574 and later
C925LHS42.HV.P573 and previousLHS42.HV.P574 and later
C950LHS42.TP.P573 and previousLHS42.TP.P574 and later
X548 & XS548LHS42.VK.P573 and previousLHS42.VK.P574 and later
X74x & XS748LHS42.NY.P573 and previousLHS42.NY.P574 and later
X792 & XS79xLHS42.MR.P573 and previousLHS42.MR.P574 and later
X925 & XS925LHS42.HK.P573 and previousLHS42.HK.P574 and later
X95x & XS95xLHS42.TQ.P573 and previousLHS42.TQ.P574 and later
6500eLHS42.JR.P573 and previousLHS42.JR.P574 and later
C734LR.SK.P743 and previousLR.SK.P744 and later
C736LR.SKE.P743 and previousLR.SKE.P744 and later
E46xLR.LBH.P743 and previousLR.LBH.P744 and later
T65xLR.JP.P743 and previousLR.JP.P744 and later
X46xLR.BS.P743 and previousLR.BS.P744 and later
X65xLR.MN.P743 and previousLR.MN.P744 and later
X73xLR.FL.P743 and previousLR.FL.P744 and later
W850LP.JB.P742 and previousLP.JB.P743 and later
X86xLP.SP.P742 and previousLP.SP.P743 and later

Obtained Updated Software

To obtain firmware that resolves this issue or if you have special code, please contact Lexmark’s Technical Support Center at http://support.lexmark.com to find your local support center.

Workarounds

Lexmark recommends a firmware update if your device has affected firmware.

Exploitation and Public Announcements

Lexmark is not aware of any malicious use against Lexmark products of the vulnerability described in this advisory.

Lexmark would like to thank Daniel Romero and Mario Rivas of NCC group for bringing this issue to our attention.

Status of this Notice:

THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND IS PROVIDED WITHOUT ANY EXPRESS OR IMPLIED GUARANTEE OR WARRANTY WHATSOEVER, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR USE OR PURPOSE. LEXMARK RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

Distribution

This advisory is posted on Lexmark’s web site at http://support.lexmark.com/alerts Future updates to this document will be posted on Lexmark’s web site at the same location.

Revision History

RevisionDateReason
1.020 - May - 2019Initial Public Release

Top

LEGACY ID: TE921

Was this article helpful?
Top