{"id":23150,"date":"2022-01-25T00:01:00","date_gmt":"2022-01-24T23:01:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=23150"},"modified":"2022-01-24T19:25:11","modified_gmt":"2022-01-24T18:25:11","slug":"kritische-schwachstelle-cve-2021-44738-in-lexmark-druckern-jan-2022","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/01\/25\/kritische-schwachstelle-cve-2021-44738-in-lexmark-druckern-jan-2022\/","title":{"rendered":"Critical vulnerability CVE-2021-44738 in Lexmark printers (Jan. 2022)"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/2022\/01\/24\/kritische-schwachstelle-cve-2021-44738-in-lexmark-druckern-jan-2022\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]A critical vulnerability CVE-2021-44738 has been found in the PostScript interpreter of various Lexmark printers. The manufacturer warns about this vulnerability, which allows remote code execution, in a security advisory and provides a firmware update to close the vulnerability. Here is an overview of this vulnerability.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg04.met.vgwort.de\/na\/19dec3e90c704f9583cd1e449c4f07e4\" width=\"1\" height=\"1\">I&nbsp; became aware of <a href=\"https:\/\/publications.lexmark.com\/publications\/security-alerts\/CVE-2021-44738.pdf\" target=\"_blank\" rel=\"noopener\">this security advisory<\/a> dated January 18, 2022 from Lexmark via this German <a href=\"https:\/\/twitter.com\/heise_de\/status\/1485554787387064320\" target=\"_blank\" rel=\"noopener\">tweet<\/a>. Affected by the critical vulnerability (CVE-2021-44738) are numerous Lexmark printers with PostScript support. These include the B2338, B2442, B2546, B2650, C925, M3250, XM1135, etc. models. <\/p>\n<p>Vulnerability CVE-2021-44738 has been discovered in the Postscript interpreter of several Lexmark devices and has a CVSSv3 Base Score of 9.0. A buffer overflow can occur in the Postscript interpreter. The vulnerability can be exploited by an attacker to execute arbitrary code. This could become a problem, especially in networks, if the printer is then used for further attacks. <\/p>\n<p>Lexmark has not published details about the vulnerability. Currently, no attacks via this vulnerability are known.&nbsp; However, the manufacturer Lexmark provides firmware updates for the affected devices, which administrators should install promptly.<\/p>\n<p>Whether a device is vulnerable can be determined via the firmware version. To determine the firmware status of a device, Lexmark states to select the menu item \"Settings\"-&gt;\"Reports\"-&gt;\"Settings Page Menu\" on the control panel. If the firmware level listed under \"Device Information\" matches a level under \"Affected Releases\" in <a href=\"https:\/\/publications.lexmark.com\/publications\/security-alerts\/CVE-2021-44738.pdf\" target=\"_blank\" rel=\"noopener\">this Security Note<\/a>, the firmware should be updated.&nbsp; <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]A critical vulnerability CVE-2021-44738 has been found in the PostScript interpreter of various Lexmark printers. The manufacturer warns about this vulnerability, which allows remote code execution, in a security advisory and provides a firmware update to close the vulnerability. Here &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/01\/25\/kritische-schwachstelle-cve-2021-44738-in-lexmark-druckern-jan-2022\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[448,580],"tags":[415,69],"class_list":["post-23150","post","type-post","status-publish","format-standard","hentry","category-devices","category-security","tag-printer","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/23150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=23150"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/23150\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=23150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=23150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=23150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}