CVE-2025-4044

Improper · Improper Multiple Products

A high-severity vulnerability exists within multiple products from the vendor, identified as an Improper Restriction of XML External Entity Reference.

Executive summary

A high-severity vulnerability exists within multiple products from the vendor, identified as an Improper Restriction of XML External Entity Reference. This flaw, present in various printer drivers, can be exploited by an attacker to force the affected system to access and disclose sensitive files or interact with arbitrary network resources, leading to a potential data breach.

Vulnerability

The vulnerability is an XML External Entity (XXE) injection flaw. According to the description, affected Lexmark printer drivers for Windows utilize an XML parser that is improperly configured to process external entities within user-supplied XML data. An attacker can exploit this by crafting a malicious file (such as a print job or configuration file) containing a reference to an external entity. When the vulnerable driver parses this file, it will resolve the external entity, allowing the attacker to read arbitrary local files from the system (e.g., file:///c:/windows/win.ini) or initiate server-side requests to internal or external network resources, exfiltrating the retrieved data to an attacker-controlled URL.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.2. Successful exploitation could lead to the unauthorized disclosure of sensitive information from any system running the vulnerable driver, including user workstations and critical print servers. An attacker could exfiltrate configuration files, user credentials, private keys, or other proprietary business data stored on the machine. This could result in a significant data breach, facilitate further lateral movement within the network, lead to regulatory non-compliance penalties, and cause considerable reputational damage to the organization.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected systems immediately. After patching, review system and application logs for any signs of compromise that may have occurred prior to the update.

Proactive Monitoring: Security teams should monitor for indicators of compromise, including unusual outbound network traffic originating from the printer driver processes on workstations and servers. Specifically, look for DNS lookups and HTTP/FTP requests to unknown or suspicious external URLs. Monitor system logs for file access errors or unexpected network connection attempts initiated by the print spooler service or associated driver processes.

Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:

  • Egress Filtering: Use a firewall to block or restrict outbound network connections from workstations and print servers to the internet, especially from processes associated with the printer drivers.
  • Network Segmentation: Isolate print servers in a secured network segment with strict access controls to limit their ability to communicate with critical internal systems.
  • Host-based Intrusion Prevention System (HIPS): Deploy HIPS rules to prevent the printer driver processes from accessing sensitive files/directories or initiating unauthorized network connections.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the high CVSS score of 8.2 and the potential for sensitive data exfiltration, this vulnerability poses a significant risk to the organization. It is strongly recommended that all affected Lexmark printer drivers be patched immediately, prioritizing critical systems such as print servers and workstations used by employees with privileged access. While there is no current evidence of active exploitation, the low complexity of the attack means organizations should act preemptively to apply vendor patches and implement monitoring to prevent a potential data breach.