Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65080: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Lexmark MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ

0
Medium
VulnerabilityCVE-2025-65080cvecve-2025-65080cwe-843
Published: Tue Feb 03 2026 (02/03/2026, 20:35:54 UTC)
Source: CVE Database V5
Vendor/Project: Lexmark
Product: MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ

Description

A type confusion vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user.

AI-Powered Analysis

AILast updated: 02/03/2026, 21:15:55 UTC

Technical Analysis

CVE-2025-65080 is a type confusion vulnerability categorized under CWE-843 found in the Postscript interpreter component of numerous Lexmark printer models, including MXTCT, MSNGM, MSTGM, and others. Type confusion occurs when a program accesses a resource using an incompatible type, leading to undefined behavior such as memory corruption. In this case, the vulnerability allows an attacker to craft malicious Postscript data that the printer improperly processes, resulting in arbitrary code execution. The attacker can exploit this flaw remotely over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality, integrity, and availability is limited but significant, as the attacker gains code execution as an unprivileged user, potentially enabling further attacks or disruption of printing services. The vulnerability affects a broad range of Lexmark devices, suggesting a systemic issue in the Postscript interpreter implementation. No patches or known exploits have been reported at the time of publication, but the vulnerability's characteristics make it a plausible target for future exploitation. The CVSS 4.0 score of 6.9 reflects medium severity, balancing the ease of exploitation with the limited privilege level obtained.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized remote code execution on network-connected Lexmark printers. Attackers could leverage this to disrupt printing operations, exfiltrate sensitive documents, or pivot into internal networks for further compromise. Given that printers often reside within corporate networks and may have access to sensitive data streams, exploitation could lead to confidentiality breaches and operational downtime. The lack of authentication and user interaction requirements increases the attack surface, especially in environments with poorly segmented networks or exposed printer management interfaces. Critical sectors such as government, finance, healthcare, and manufacturing that rely on Lexmark devices for document processing could experience significant operational impact. Additionally, the vulnerability could be exploited as a foothold for lateral movement within enterprise networks, amplifying the potential damage. Although no active exploits are known, the medium severity rating and remote attack vector warrant proactive mitigation to prevent future incidents.

Mitigation Recommendations

Organizations should implement a multi-layered defense strategy. First, monitor Lexmark’s official channels for patches addressing CVE-2025-65080 and apply them immediately upon release. Until patches are available, restrict network access to affected printers by isolating them on dedicated VLANs or subnets and limiting management interface exposure to trusted administrators only. Employ network-level controls such as firewalls and access control lists to block unauthorized inbound traffic to printer devices. Regularly audit printer firmware versions and configurations to identify and remediate vulnerable devices. Implement strict monitoring and logging of printer network activity to detect anomalous behavior indicative of exploitation attempts. Educate IT staff about this vulnerability to ensure rapid response capability. Consider disabling Postscript interpreter functionality if not required for business operations, reducing the attack surface. Finally, integrate printer security into broader endpoint and network security frameworks to enhance detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Lexmark
Date Reserved
2025-11-17T13:56:38.589Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698261daf9fa50a62fdf39d9

Added to database: 2/3/2026, 9:00:10 PM

Last enriched: 2/3/2026, 9:15:55 PM

Last updated: 2/3/2026, 11:28:31 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats