“No remedy available as of June 21, 2021,” according to the researcher who discovered the easy-to-exploit, no-user-action-required bug.
<div class="c-article__content js-reading-content"> <p>Lexmark printers – those ubiquitous, inky office workhorses that fill homes and offices, and are found all the way on up to the federal government – have an unpatched vulnerability that could lead to serious, easy-to-execute attacks that require neither privileges nor user interaction and which can lead to arbitrary code execution.</p> <p>According to an <a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/204093" target="_blank" rel="noopener">advisory</a> filed by researcher Julio Aviña on the IBM X-Force Exchange, the flaw could lead to a low-complexity attack that could allow a local attacker to execute arbitrary code. The vulnerability’s CVSS 3.0 base score is high, at 8.4. Fortunately, it doesn’t appear to have been exploited yet: The report lists the bug’s exploitability as “unproven.”</p> <p>The bug, found in the <a href="http://support.lexmark.com/index?id=DR25246&page=content&docLocale=sk_SK&locale=en&userlocale=EN_US" target="_blank" rel="noopener">Lexmark Printer Software G2 Installation Package</a>, is caused by an unquoted service-path vulnerability in the “LM__bdsvc” service. That package allows an administrator to customize the users’ installation experience, according to Lexmark.</p> <p><a href="https://threatpost.com/newsletter-sign/" target="_blank" rel="noopener"><img loading="lazy" class="aligncenter wp-image-141989 size-full" src="https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/subscribe2.jpg" alt="" width="700" height="50"></a></p> <p>The installation package in question runs on Microsoft Windows operating systems Vista (32-bit/64-bit), Server 2008 (32-bit/64-bit), Windows 7 (32-bit/64-bit), Server 2008 R2 (64-bit), Windows 8.1 (32-bit/64-bit), Windows 10 Client (32-bit/64-bit), Windows Server 2012, Server 2012 (64-bit) R2, Server 2016 (64-bit) and Server 2019 (64-bit) print and scan drivers with an enhanced GUI.</p> <p>“By placing a specially crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system,” the advisory explained. According to ProcessChecker, a service that shows information about running processes, LM__bdsvc.exe is part of the printer communication system.</p> <p>As of Tuesday, there was no patch or other workaround available, Aviña wrote: “No remedy available as of June 21, 2021.”</p> <p>The advisory states that a successful attempt to exploit the bug requires the attacker “to insert an executable file into the service path undetected by the OS or some security application.” When the service or the system restarts, that executable will run with elevated privileges.</p> <p>Lexmark told Threatpost on Tuesday that a fix is in the works. Lexmark CSO Bryan Willett said in an emailed statement that “Lexmark takes security very seriously. We are aware of this concern and are working to address the vulnerability. We welcome security researchers to report vulnerabilities directly at <a href="https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html" target="_blank" rel="noopener">Lexmark Security Advisories</a>.”</p> <h2>How to Fall Asleep on Your Lexmark Printer</h2> <p>Beyond known security vulnerabilities, Lexmark printers have in the past been prone to a trivial hack thanks to what researchers have called “gross negligence” on the part of users. In 2017, researchers at NewSky Security warned that they had found <a href="https://threatpost.com/user-gross-negligence-leaves-hundreds-of-lexmark-printers-open-to-attack/129187/" target="_blank" rel="noopener">hundreds of Lexmark printers</a> misconfigured, open to the public internet and easily accessible to anyone interested in taking control of targeted devices.</p> <p>Researchers identified 1,123 Lexmark printers traced back to businesses, universities and, in some cases, U.S. government offices. Adversaries with access to those printers could perform a number of malicious actions: The fact that they were open to the internet enabled attackers to add a backdoor, to capture print jobs, to knock a printer offline, to print junk content or to physically disrupt a printer’s operation.</p> <h2>U.S. Government Loves Security Bug-Ridden Lexmarks</h2> <p>Besides Lexmark users’ negligence, U.S. government use of Lexmark printers pockmarked with security vulnerabilities has been rife. A federal audit published in July 2019 found that the U.S. Army and Air Force used government purchase cards to spend at least $32.8 million in fiscal year 2018 on commercial off-the-shelf IT products with “known cybersecurity vulnerabilities.”</p> <p>Lexmark printers were among them, according to the <a href="https://media.defense.gov/2019/Jul/30/2002164272/-1/-1/1/DODIG-2019-106.PDF" target="_blank" rel="noopener">Inspector General of the Department of Defense</a> (DoD). In fact, the lion’s share of that money – more than $30 million – was spent on 8,000 Lexmark printers. At the time, according to the audit, the <a href="https://nvd.nist.gov/" target="_blank" rel="noopener">National Vulnerabilities Database </a>(NVD) listed 20 cybersecurity vulnerabilities in Lexmark printers, including storing and transmitting sensitive network access credentials in plain text and allowing the execution of malicious code on the printer. According to the report, the vulnerabilities could have allowed remote attackers to use a connected Lexmark printer “to conduct cyberespionage” or to launch a denial-of-service (DoS) attack on a DoD network.</p> <h2>How Worried Should We Be?</h2> <p>Andrew Barratt, managing principal of solutions and investigations at cybersecurity advisory provider Coalfire, told Threatpost that there’s “nothing new about this kind of vulnerability,” given that they are, unfortunately, “very common.”</p> <p>Successful execution requires an intruder to have access to the underlying host system, Barratt said via email on Tuesday, so it’s “more of an attack vector for potential lateral movement and privilege escalation.” He noted that the bug could be used potentially by a malicious insider looking to circumvent permissions on a corporate computer, for example.</p> <p>062221 14:06 UPDATE: corrected reference to “remote” code execution, which should have read “arbitrary” code execution.</p> <p><b>Join Threatpost for “</b><a href="https://threatpost.com/webinars/tips-and-tactics-for-better-threat-hunting/?utm_source=ART&utm_medium=ART&utm_campaign=June_PaloAltoNetworks_Webinar" target="_blank" rel="noopener"><b>Tips and Tactics for Better Threat Hunting</b></a><b>” — a LIVE event on </b><a href="https://threatpost.com/webinars/tips-and-tactics-for-better-threat-hunting/?utm_source=ART&utm_medium=ART&utm_campaign=June_PaloAltoNetworks_Webinar" target="_blank" rel="noopener"><b>Wed., June 30 at 2:00 PM ET</b></a><b> in partnership with Palo Alto Networks. Learn from Palo Alto’s Unit 42 experts the best way to hunt down threats and how to use automation to help. </b><a href="https://threatpost.com/webinars/tips-and-tactics-for-better-threat-hunting/?utm_source=ART&utm_medium=ART&utm_campaign=June_PaloAltoNetworks_Webinar" target="_blank" rel="noopener"><b>Register HERE</b></a><b> for free. </b></p> <footer class="c-article__footer"> <div class="c-article__footer__container"> <div class="c-article__footer__col"> <a href="#discussion" class="c-button c-button--secondary">Write a comment</a> </div> <div class="c-article__footer__col"> <div class="c-article__sharing"> <p><strong>Share this article:</strong></p> <nav class="c-nav-sharing"> <div class="social-likes social-likes_notext" data-title="Lexmark Printers Open to Arbitrary Code-Execution Zero-Day" data-url="https://threatpost.com/lexmark-printers-code-execution-zero-day/167111/" data-counters="no" data-zeroes="yes"><div class="facebook" title="Share via Facebook"></div> <div class="twitter" title="Share via Twitter"></div><div class="linkedin" title="Share via LinkedIn"></div> <div class="reddit" title="Share via Reddit"></div> <div class="flipboard" title="Share via Flipboard"></div> </div> </nav> </div> </div> </div> <div class="c-article__footer__container"> <div class="c-article__footer__col"></div> <div class="c-article__footer__col"> <ul class="c-list-categories"> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/vulnerabilities/">Vulnerabilities</a></li> </ul> </div> </div> </footer> </div>