Lucene search

K
zdiJames Horseman and Zach Hanley of Horizon3 A.I.ZDI-23-668
HistoryMay 17, 2023 - 12:00 a.m.

(Pwn2Own) Lexmark MC3224i fax_change_faxtrace_setting Command Injection Remote Code Execution Vulnerability

2023-05-1700:00:00
James Horseman and Zach Hanley of Horizon3 A.I.
www.zerodayinitiative.com
4
lexmark mc3224i
command injection
remote code execution
network-adjacent attackers
user-supplied string
system call
httpd user

0.17 Low

EPSS

Percentile

96.1%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the fax_change_faxtrace_settings script. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the httpd user.