Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65079: CWE-122 Heap-based Buffer Overflow in Lexmark MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ

0
Medium
VulnerabilityCVE-2025-65079cvecve-2025-65079cwe-122
Published: Tue Feb 03 2026 (02/03/2026, 20:23:24 UTC)
Source: CVE Database V5
Vendor/Project: Lexmark
Product: MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ

Description

A heap-based buffer overflow vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user.

AI-Powered Analysis

AILast updated: 02/03/2026, 20:59:46 UTC

Technical Analysis

CVE-2025-65079 is a heap-based buffer overflow vulnerability (CWE-122) identified in the Postscript interpreter component embedded in a broad range of Lexmark printer models, including MXTCT, MSNGM, MSTGM, MXNGM, and others. The vulnerability arises from improper handling of Postscript data, allowing an attacker to overflow a heap buffer and overwrite memory. This flaw can be exploited remotely over the network without requiring authentication or user interaction, enabling arbitrary code execution with the privileges of the Postscript interpreter process, typically an unprivileged user. The vulnerability affects multiple Lexmark devices widely deployed in enterprise and government environments for document processing. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. No patches or known exploits are currently available, but the vulnerability's presence in critical print infrastructure poses a risk of device compromise, lateral movement, or disruption of printing services. The vulnerability was reserved in November 2025 and published in February 2026, indicating recent discovery. The lack of patch links suggests vendors have not yet released fixes, emphasizing the need for proactive mitigation.

Potential Impact

For European organizations, this vulnerability presents a tangible risk to the security and availability of networked printing infrastructure. Successful exploitation could allow attackers to execute arbitrary code on affected Lexmark devices, potentially leading to device takeover, interception or manipulation of print jobs, and pivoting into internal networks. This could compromise sensitive documents, disrupt business operations, and serve as a foothold for broader attacks. Sectors with heavy reliance on printing, such as government agencies, legal firms, healthcare providers, and financial institutions, are particularly vulnerable. The medium CVSS score reflects moderate impact, but the ease of exploitation without authentication increases risk. Additionally, compromised printers could be used to launch attacks against other network assets. The absence of patches means organizations must rely on compensating controls to reduce exposure. Given the widespread use of Lexmark devices across Europe, the threat could affect a large number of enterprises if exploited at scale.

Mitigation Recommendations

1. Conduct a comprehensive inventory of all Lexmark devices in use, identifying affected models listed in the CVE. 2. Immediately isolate vulnerable printers on segmented networks or VLANs to limit exposure to untrusted networks. 3. Disable Postscript processing on printers where it is not required, or restrict Postscript input sources to trusted users and systems. 4. Implement strict access controls and firewall rules to limit network access to printer management interfaces and services. 5. Monitor network traffic and device logs for anomalous activity indicative of exploitation attempts, such as unexpected Postscript data or abnormal process behavior. 6. Engage with Lexmark support channels to obtain information on forthcoming patches or firmware updates and plan timely deployment once available. 7. Educate IT and security teams about this vulnerability to ensure rapid response capability. 8. Consider deploying network-based intrusion detection/prevention systems with signatures targeting Postscript exploitation attempts. 9. Regularly review and update printer firmware and security configurations as part of standard maintenance. 10. Where possible, replace legacy or unsupported devices with models that have robust security features and vendor support.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Lexmark
Date Reserved
2025-11-17T13:56:38.589Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69825e55f9fa50a62fde8b5f

Added to database: 2/3/2026, 8:45:09 PM

Last enriched: 2/3/2026, 8:59:46 PM

Last updated: 2/3/2026, 11:04:19 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats