Lexmark Security Advisory:
| Revision:|| 1.2|
| Last update: || 30 January 2020|
| Public Release Date:|| 5 February 2020|
A stored cross site scripting vulnerability has been identified in older Lexmark devices.
A stored cross site scripting vulnerability has been identified in the embedded web server used in older generation Lexmark devices. The vulnerability can be used to attack the users browser, exposing session credentials and other information accessible to the browser.
|CVSSv3.1 Base Score||5.7||(AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N)|
CVSSv3 scores are calculated in accordance with CVSS version 3.1 (https://www.first.org/cvss/user-guide)
Successful exploitation of this vulnerability can lead to disclosure of information accessible to the browser.
To determine a device's firmware level, select the Settings > Reports > Menu Setting Page menu item from the operator panel. If the firmware level listed under “Device Information” matches any level under “Affected Releases”, then upgrade to a “Fixed Release”.
|Lexmark Models||Affected Releases||Fixed Releases|
|CS31x||LW73.VYL.P263 and previous||LW73.VYL.P264 and later|
|CS41x||LW73.VY2.P263 and previous||LW73.VY2.P264 and later|
|CS51x||LW73.VY4.P263 and previous||LW73.VY4.P264 and later|
|CX310||LW73.GM2.P263 and previous||LW73.GM2.P264 and later|
|CX410 & XC2130||LW73.GM4.P263 and previous||LW73.GM4.P264 and later|
|CX510 & XC2132||LW73.GM7.P263 and previous||LW73.GM7.P264 and later|
|MS310, MS312, MS317||LW73.PRL.P263 and previous||LW73.PRL.P264 and later|
|MS410, M1140||LW73.PRL.P263 and previous||LW73.PRL.P264 and later|
|MS315, MS415, MS417||LW73.TL2.P263 and previous||LW73.TL2.P264 and later|
|MS51x, MS610dn, MS617||LW73.PR2.P263 and previous||LW73.PR2.P264 and later|
|M1145, M3150dn||LW73.PR2.P263 and previous||LW73.PR2.P264 and later|
|MS610de, M3150||LW73.PR4.P263 and previous||LW73.PR4.P264 and later|
|MS71x,M5163dn||LW73.DN2.P263 and previous||LW73.DN2.P264 and later|
|MS810, MS811, MS812, MS817, MS818||LW73.DN2.P263 and previous||LW73.DN2.P264 and later|
|MS810de, M5155, M5163||LW73.DN4.P263 and previous||LW73.DN4.P264 and later|
|MS812de, M5170||LW73.DN7.P263 and previous||LW73.DN7.P264 and later|
|MS91x||LW73.SA.P263 and previous||LW73.SA.P264 and later|
|MX31x, XM1135||LW73.SB2.P263 and previous||LW73.SB2.P264 and later|
|MX410, MX510 & MX511||LW73.SB4.P263 and previous||LW73.SB4.P264 and later|
|XM1140, XM1145||LW73.SB4.P263 and previous||LW73.SB4.P264 and later|
|MX610 & MX611||LW73.SB7.P263 and previous||LW73.SB7.P264 and later|
|XM3150||LW73.SB7.P263 and previous||LW73.SB7.P264 and later|
|MX71x, MX81x||LW73.TU.P263 and previous||LW73.TU.P264 and later|
|XM51xx & XM71xx||LW73.TU.P263 and previous||LW73.TU.P264 and later|
|MX91x & XM91x||LW73.MG.P263 and previous||LW73.MG.P264 and later|
|MX6500e||LW73.JD.P263 and previous||LW73.JD.P264 and later|
|C746||LHS60.CM2.P731 and previous||LHS60.CM2.P732 and later|
|C748, CS748||LHS60.CM4.P731 and previous||LHS60.CM4.P732 and later|
|C792, CS796||LHS60.HC.P731 and previous||LHS60.HC.P732 and later|
|C925||LHS60.HV.P731 and previous||LHS60.HV.P732 and later|
|C950||LHS60.TP.P731 and previous||LHS60.TP.P732 and later|
|X548 & XS548||LHS60.VK.P731 and previous||LHS60.VK.P732 and later|
|X74x & XS748||LHS60.NY.P731 and previous||LHS60.NY.P732 and later|
X792 & XS79x
|LHS60.MR.P731 and previous||LHS60.MR.P732 and later|
|X925 & XS925||LHS60.HK.P731 and previous||LHS60.HK.P732 and later|
|X95x & XS95x||LHS60.TQ.P731 and previous||LHS60.TQ.P732 and later|
|6500e||LHS60.JR.P731 and previous||LHS60.JR.P732 and later|
|C734||LR.SK.P822 and previous||LR.SK.P823 and later|
|C736||LR.SKE.P822 and previous||LR.SKE.P823 and later|
|E46x||LR.LBH.P822 and previous||LR.LBH.P823 and later|
|T65x||LR.JP.P822 and previous||LR.JP.P823 and later|
|X46x||LR.BS.P822 and previous||LR.BS.P823 and later|
|X65x ||LR.MN.P822 and previous||LR.MN.P823 and later|
|X73x||LR.FL.P822 and previous||LR.FL.P823 and later|
|W850||LP.JB.P821 and previous||LP.JB.P822 and later|
|X86x||LP.SP.P821 and previous||LP.SP.P822 and later|
Obtained Updated Software
To obtain firmware that resolves this issue or if you have special code, please contact Lexmark’s Technical Support Center athttp://support.lexmark.com to find your local support center.
Lexmark recommends a firmware update if your device has affected firmware.
Exploitation and Public Announcements
Lexmark is not aware of any malicious use against Lexmark products of the vulnerability described in this advisory.
Lexmark would like to thank David de Paula Santos Silva for bringing this issue to our attention.
Status of this Notice:
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND IS PROVIDED WITHOUT ANY EXPRESS OR IMPLIED GUARANTEE OR WARRANTY WHATSOEVER, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR USE OR PURPOSE. LEXMARK RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
This advisory is posted on Lexmark’s web site at http://support.lexmark.com/alerts Future updates to this document will be posted on Lexmark’s web site at the same location.
|1.2||05 - February - 2020||Initial Publication|
LEGACY ID: TE933