Skip to main content

CVE-2025-4044: CWE-611 Improper Restriction of XML External Entity Reference in Lexmark Universal Print Driver

High
VulnerabilityCVE-2025-4044cvecve-2025-4044cwe-611
Published: Tue Aug 19 2025 (08/19/2025, 13:12:09 UTC)
Source: CVE Database V5
Vendor/Project: Lexmark
Product: Universal Print Driver

Description

Improper Restriction of XML External Entity Reference in various Lexmark printer drivers for Windows allows attacker to disclose sensitive information to an arbitrary URL.

AI-Powered Analysis

AILast updated: 08/19/2025, 13:48:06 UTC

Technical Analysis

CVE-2025-4044 is a high-severity vulnerability classified under CWE-611, which pertains to Improper Restriction of XML External Entity (XXE) Reference. This vulnerability affects the Lexmark Universal Print Driver for Windows. The flaw arises from the driver's improper handling of XML input, allowing an attacker to craft malicious XML data that triggers the processing of external entities. Exploiting this vulnerability enables an attacker with limited privileges (local access with low complexity) and requiring user interaction to cause the driver to disclose sensitive information to an arbitrary URL controlled by the attacker. The vulnerability impacts confidentiality, integrity, and availability, as indicated by the CVSS vector (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H). The scope is changed, meaning the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently in the wild, the high CVSS score of 8.2 reflects the significant risk posed by this vulnerability if exploited. The vulnerability is particularly dangerous because print drivers often run with elevated privileges and handle complex data formats, making them attractive targets for attackers aiming to escalate privileges or exfiltrate sensitive data. The lack of available patches at the time of publication increases the urgency for organizations to implement mitigations.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially in environments where Lexmark Universal Print Drivers are widely deployed. The potential for sensitive information disclosure could lead to data breaches involving personal data protected under GDPR, resulting in regulatory penalties and reputational damage. The compromise of print drivers could also be leveraged as a foothold for lateral movement within corporate networks, threatening critical infrastructure and intellectual property. Given the widespread use of Lexmark printers in sectors such as government, finance, healthcare, and manufacturing across Europe, the impact could be severe. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, particularly in environments with shared workstations or where social engineering could be employed. The vulnerability's ability to affect confidentiality, integrity, and availability simultaneously means that organizations could face data loss, unauthorized data modification, and service disruption, all of which have significant operational and financial consequences.

Mitigation Recommendations

European organizations should immediately audit their environments to identify all instances of Lexmark Universal Print Drivers installed on Windows systems. Until official patches are released, organizations should consider the following specific mitigations: 1) Restrict local user privileges to the minimum necessary to prevent unauthorized driver interaction; 2) Implement application whitelisting and endpoint protection solutions to detect and block suspicious XML processing activities related to print drivers; 3) Disable or restrict the use of the Lexmark Universal Print Driver where possible, especially on high-risk or sensitive systems; 4) Employ network segmentation to isolate print servers and workstations running vulnerable drivers from critical assets; 5) Educate users about the risks of interacting with untrusted print jobs or documents that could trigger malicious XML processing; 6) Monitor network traffic for unusual outbound connections to unknown URLs that could indicate data exfiltration attempts; 7) Prepare for rapid deployment of patches once available by establishing a prioritized patch management process focused on print infrastructure. These targeted actions go beyond generic advice by focusing on the unique aspects of this vulnerability and the operational context of print drivers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Lexmark
Date Reserved
2025-04-28T17:54:55.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a47cffad5a09ad00f80eb1

Added to database: 8/19/2025, 1:32:47 PM

Last enriched: 8/19/2025, 1:48:06 PM

Last updated: 8/20/2025, 12:35:26 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats