Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-22960 PoC — Lexmark 安全漏洞

Source
Associated Vulnerability
Title:Lexmark 安全漏洞 (CVE-2023-22960)
Description:Lexmark是美国的一系列打印机。 Lexmark products 2023-01-10版本及之前版本存在安全漏洞,该漏洞源于交互频率控制不当。
Description
This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.
Readme
# PoC for CVE-2023-22960 
[![Python](https://img.shields.io/badge/Python-%E2%89%A5%203.6-yellow.svg)](https://www.python.org/) 
<img src="https://img.shields.io/badge/Developed%20on-kali%20linux-blueviolet">
[![License](https://img.shields.io/badge/license-MIT-red.svg)](https://github.com/t3l3machus/CVE-2023-22960/blob/main/LICENSE) 
## Details
PoC for CVE-2023-22960 that I discovered. This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server interface of all Lexmark printer models that have a firmware version released before 01/2023. This issue affects both username-password and PIN authentication.

**Official security advisory** -> https://publications.lexmark.com/publications/security-alerts/CVE-2023-22960.pdf

**PoC tested against**:
 - Lexmark MX622adhe 
 - Lexmark CX735adse 
 - Lexmark MX521ade

#### Video Presentation
In this video I demonstrate the issue as well as how to write an http(s) login bruteforce script with Python.  
https://www.youtube.com/watch?v=HuAqTScr_3s

## Preview

Without the brute-force prevention bypass:  
![image](https://user-images.githubusercontent.com/75489922/214288009-d0cda79b-e604-478a-9bbc-39175c20a6ab.png)


Applying the brute-force prevention bypass:  
![image](https://user-images.githubusercontent.com/75489922/214286428-fb2cc7b3-9c58-4aed-a343-2d66610ca407.png)

File Snapshot

[4.0K] /data/pocs/4f8d3df2eec4673bb1983614b8715198c0eb714d ├── [3.6K] lexmark-brute-force-login.py ├── [3.1K] lexmark-brute-force-pins.py ├── [1.1K] LICENSE └── [1.4K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.