Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65078: CWE-426 Untrusted Search Path in Lexmark MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ

0
Critical
VulnerabilityCVE-2025-65078cvecve-2025-65078cwe-426
Published: Tue Feb 03 2026 (02/03/2026, 20:51:20 UTC)
Source: CVE Database V5
Vendor/Project: Lexmark
Product: MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ

Description

An untrusted search path vulnerability has been identified in the Embedded Solutions Framework in various Lexmark devices. This vulnerability can be leveraged by an attacker to execute arbitrary code.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:35:56 UTC

Technical Analysis

CVE-2025-65078 is an untrusted search path vulnerability (CWE-426) identified in the Embedded Solutions Framework of numerous Lexmark device models, including MXTCT, MSNGM, MSTGM, MXNGM, and others. The vulnerability arises because the affected devices improperly handle the search path for executable files, allowing an attacker to place malicious executables in locations that the system searches before the legitimate ones. This flaw enables remote, unauthenticated attackers to execute arbitrary code with high privileges on the device without requiring any user interaction. The vulnerability is rated critical with a CVSS 4.0 score of 9.3, reflecting its network attack vector, low complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. The affected Lexmark devices are widely used in enterprise and government environments for printing and document management, making the vulnerability a significant risk for data breaches, device takeover, and disruption of services. No patches or official fixes have been published yet, and no known exploits have been observed in the wild, but the vulnerability's characteristics suggest it could be weaponized quickly. The issue was reserved in November 2025 and published in February 2026, indicating recent discovery and disclosure.

Potential Impact

The impact of CVE-2025-65078 is severe for organizations globally that deploy the affected Lexmark devices. Successful exploitation allows attackers to gain full control over the device, potentially leading to unauthorized access to sensitive documents, interception or alteration of print jobs, and pivoting into internal networks. This can result in data leakage, disruption of business operations, and compromise of network integrity. Given the critical nature of printing infrastructure in many enterprises and government agencies, the vulnerability could be leveraged for espionage, sabotage, or ransomware deployment. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. Organizations relying on these Lexmark models in sectors such as finance, healthcare, government, and manufacturing face heightened risks of operational disruption and data breaches.

Mitigation Recommendations

Until official patches are released by Lexmark, organizations should implement the following mitigations: 1) Isolate affected Lexmark devices on segmented network zones with strict access controls to limit exposure. 2) Monitor network traffic to and from these devices for unusual activity or unauthorized file transfers. 3) Disable unnecessary network services and remote management interfaces on the devices. 4) Employ application whitelisting or endpoint protection solutions that can detect or block unauthorized executable files on device management servers. 5) Regularly audit device configurations and firmware versions to identify affected units. 6) Educate IT and security teams about the vulnerability to ensure rapid response to any suspicious behavior. 7) Engage with Lexmark support for updates and apply patches immediately upon availability. 8) Consider temporary replacement or removal of vulnerable devices from critical environments if feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Lexmark
Date Reserved
2025-11-17T13:56:38.588Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698261daf9fa50a62fdf39d6

Added to database: 2/3/2026, 9:00:10 PM

Last enriched: 2/27/2026, 7:35:56 AM

Last updated: 3/24/2026, 1:06:09 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses