CVE-2025-65077: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Lexmark MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ
CVE-2025-65077 is a high-severity path traversal vulnerability affecting multiple Lexmark embedded device models. It allows an unauthenticated attacker to exploit improper pathname restrictions to execute arbitrary code as an unprivileged user. The flaw exists in the Embedded Solutions Framework of Lexmark devices, enabling attackers to access restricted directories and potentially compromise device integrity. The CVSS 4. 0 score is 8. 8, reflecting network exploitability without authentication or user interaction. Although no known exploits are currently reported in the wild, the vulnerability poses significant risks to organizations using affected Lexmark devices. European organizations relying on these devices for printing and document management could face confidentiality and integrity breaches. Mitigation requires prompt vendor patching once available and network-level protections to restrict device access. Countries with high Lexmark market penetration and critical infrastructure using these devices are at greater risk.
AI Analysis
Technical Summary
CVE-2025-65077 is a path traversal vulnerability classified under CWE-22, discovered in the Embedded Solutions Framework of various Lexmark multifunction printers and embedded devices. The vulnerability arises from improper limitation of pathname inputs, allowing an attacker to traverse directories outside the intended restricted directory scope. This flaw can be exploited remotely over the network without any authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation allows arbitrary code execution with unprivileged user rights, potentially enabling attackers to manipulate device functions, access sensitive data stored on the device, or use the device as a foothold for further network compromise. The affected products include a broad range of Lexmark models (MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ), which are widely deployed in enterprise and governmental environments. Although no public exploits have been reported yet, the vulnerability’s characteristics make it a high-risk issue that could be weaponized by attackers to compromise device integrity and potentially pivot into internal networks. The lack of authentication and user interaction requirements significantly lowers the barrier for exploitation. The vulnerability was reserved in late 2025 and published in early 2026, with no patches currently listed, emphasizing the need for immediate attention from affected organizations.
Potential Impact
For European organizations, the impact of CVE-2025-65077 is substantial. Lexmark devices are commonly used in office environments for printing, scanning, and document management, often containing sensitive corporate or governmental information. Exploitation could lead to unauthorized access to confidential documents, alteration or deletion of stored data, and disruption of printing services, impacting business continuity. Moreover, compromised devices could serve as entry points for lateral movement within corporate networks, increasing the risk of broader cyberattacks such as ransomware or espionage. Critical sectors including finance, healthcare, government, and manufacturing in Europe could face operational disruptions and data breaches. The vulnerability’s network accessibility and lack of authentication requirement make it particularly dangerous in environments where devices are exposed to untrusted networks or insufficiently segmented internal networks. Additionally, the integrity of document workflows could be undermined, affecting compliance with data protection regulations such as GDPR.
Mitigation Recommendations
Immediate mitigation steps include isolating affected Lexmark devices from untrusted networks and restricting network access to trusted management segments only. Organizations should implement strict network segmentation and firewall rules to limit exposure of these devices. Monitoring network traffic for unusual activity targeting Lexmark device management ports can help detect exploitation attempts. Until official patches are released by Lexmark, applying virtual patching via intrusion prevention systems (IPS) or endpoint detection and response (EDR) solutions that can block path traversal attempts is advisable. Regularly auditing device firmware versions and subscribing to Lexmark security advisories will ensure timely application of patches once available. Additionally, disabling unnecessary services and interfaces on the devices can reduce the attack surface. Organizations should also review and enforce strong access controls and logging on these devices to detect and respond to suspicious activities promptly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-65077: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Lexmark MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ
Description
CVE-2025-65077 is a high-severity path traversal vulnerability affecting multiple Lexmark embedded device models. It allows an unauthenticated attacker to exploit improper pathname restrictions to execute arbitrary code as an unprivileged user. The flaw exists in the Embedded Solutions Framework of Lexmark devices, enabling attackers to access restricted directories and potentially compromise device integrity. The CVSS 4. 0 score is 8. 8, reflecting network exploitability without authentication or user interaction. Although no known exploits are currently reported in the wild, the vulnerability poses significant risks to organizations using affected Lexmark devices. European organizations relying on these devices for printing and document management could face confidentiality and integrity breaches. Mitigation requires prompt vendor patching once available and network-level protections to restrict device access. Countries with high Lexmark market penetration and critical infrastructure using these devices are at greater risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-65077 is a path traversal vulnerability classified under CWE-22, discovered in the Embedded Solutions Framework of various Lexmark multifunction printers and embedded devices. The vulnerability arises from improper limitation of pathname inputs, allowing an attacker to traverse directories outside the intended restricted directory scope. This flaw can be exploited remotely over the network without any authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation allows arbitrary code execution with unprivileged user rights, potentially enabling attackers to manipulate device functions, access sensitive data stored on the device, or use the device as a foothold for further network compromise. The affected products include a broad range of Lexmark models (MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ), which are widely deployed in enterprise and governmental environments. Although no public exploits have been reported yet, the vulnerability’s characteristics make it a high-risk issue that could be weaponized by attackers to compromise device integrity and potentially pivot into internal networks. The lack of authentication and user interaction requirements significantly lowers the barrier for exploitation. The vulnerability was reserved in late 2025 and published in early 2026, with no patches currently listed, emphasizing the need for immediate attention from affected organizations.
Potential Impact
For European organizations, the impact of CVE-2025-65077 is substantial. Lexmark devices are commonly used in office environments for printing, scanning, and document management, often containing sensitive corporate or governmental information. Exploitation could lead to unauthorized access to confidential documents, alteration or deletion of stored data, and disruption of printing services, impacting business continuity. Moreover, compromised devices could serve as entry points for lateral movement within corporate networks, increasing the risk of broader cyberattacks such as ransomware or espionage. Critical sectors including finance, healthcare, government, and manufacturing in Europe could face operational disruptions and data breaches. The vulnerability’s network accessibility and lack of authentication requirement make it particularly dangerous in environments where devices are exposed to untrusted networks or insufficiently segmented internal networks. Additionally, the integrity of document workflows could be undermined, affecting compliance with data protection regulations such as GDPR.
Mitigation Recommendations
Immediate mitigation steps include isolating affected Lexmark devices from untrusted networks and restricting network access to trusted management segments only. Organizations should implement strict network segmentation and firewall rules to limit exposure of these devices. Monitoring network traffic for unusual activity targeting Lexmark device management ports can help detect exploitation attempts. Until official patches are released by Lexmark, applying virtual patching via intrusion prevention systems (IPS) or endpoint detection and response (EDR) solutions that can block path traversal attempts is advisable. Regularly auditing device firmware versions and subscribing to Lexmark security advisories will ensure timely application of patches once available. Additionally, disabling unnecessary services and interfaces on the devices can reduce the attack surface. Organizations should also review and enforce strong access controls and logging on these devices to detect and respond to suspicious activities promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Lexmark
- Date Reserved
- 2025-11-17T13:56:38.587Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698261daf9fa50a62fdf39d3
Added to database: 2/3/2026, 9:00:10 PM
Last enriched: 2/3/2026, 9:15:26 PM
Last updated: 2/4/2026, 6:33:28 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67850: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HighCVE-2025-67849: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HighCVE-2025-67848: Improper Handling of Insufficient Permissions or Privileges
HighCVE-2025-29867: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Hancom Inc. Hancom Office 2018
HighCVE-2026-1791: CWE-434 Unrestricted Upload of File with Dangerous Type in Hillstone Networks Operation and Maintenance Security Gateway
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.