Action not permitted
Modal body text goes here.
Modal Title
Modal Body
fkie_cve-2025-9269
Vulnerability from fkie_nvd
Published
2025-09-09 18:15
Modified
2025-09-11 17:14
Severity ?
Summary
A Server-Side Request Forgery (SSRF) vulnerability has been identified in the embedded web server in various Lexmark devices. This vulnerability can be leveraged by an attacker to force the device to send an arbitrary HTTP request to a third-party server. Successful exploitation of this vulnerability can lead to internal network access / potential data disclosure from a device.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Server-Side Request Forgery (SSRF) vulnerability has been identified in the embedded web server in various Lexmark devices. This vulnerability can be leveraged by an attacker to force the device to send an arbitrary HTTP request to a third-party server.\u00a0Successful exploitation of this vulnerability can lead to internal network access / potential data disclosure from a device." } ], "id": "CVE-2025-9269", "lastModified": "2025-09-11T17:14:25.240", "metrics": { "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "7bc73191-a2b6-4c63-9918-753964601853", "type": "Secondary" } ] }, "published": "2025-09-09T18:15:36.993", "references": [ { "source": "7bc73191-a2b6-4c63-9918-753964601853", "url": "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html" } ], "sourceIdentifier": "7bc73191-a2b6-4c63-9918-753964601853", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "7bc73191-a2b6-4c63-9918-753964601853", "type": "Secondary" } ] }
CVE-2025-9269 (GCVE-0-2025-9269)
Vulnerability from cvelistv5
Published
2025-09-09 17:21
Modified
2025-09-29 15:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Summary
A Server-Side Request Forgery (SSRF) vulnerability has been identified in the embedded web server in various Lexmark devices. This vulnerability can be leveraged by an attacker to force the device to send an arbitrary HTTP request to a third-party server. Successful exploitation of this vulnerability can lead to internal network access / potential data disclosure from a device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Lexmark | CX, XC, CS, MS, MX, XM, et. al. |
Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < Version: 0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-9269", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-09T17:43:57.556819Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-09T18:36:21.085Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "webserver" ], "product": "CX, XC, CS, MS, MX, XM, et. al.", "vendor": "Lexmark", "versions": [ { "changes": [ { "at": "CXTLS.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CXTLS.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MXTLS.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MXTLS.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CSTLS.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CSTLS.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MSNSN.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MSNSN.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MSTSN.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MSTSN.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MXTSN.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MXTSN.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CSNGV.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CSNGV.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CSTGV.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CSTGV.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CXTGV.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CXTGV.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CXTPC.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CXTPC.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CSTPC.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CSTPC.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MXTCT.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MXTCT.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MXTPM.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MXTPM.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CXTMM.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CXTMM.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CSTMM.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CSTMM.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MSNGM.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MSNGM.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MSTGM.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MSTGM.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MXNGM.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MXNGM.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MXTGM.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MXTGM.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MSNGW.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MSNGW.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MSTGW.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MSTGW.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MXTGW.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "MXTGW.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CSTZJ.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CSTZJ.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CSNZJ.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CSNZJ.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CXTZJ.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CXTZJ.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CXNZJ.250.200 and later", "status": "unaffected" } ], "lessThanOrEqual": "CXNZJ.250.199", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MSLSG.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "MSLSG.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MXLSG.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "MXLSG.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MSLBD.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "MSLBD.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "MXLBD.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "MXLBD.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CSLBN.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "CSLBN.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CSLBL.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "CSLBL.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CXLBN.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "CXLBN.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CXLBL.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "CXLBL.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CXTPP.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "CXTPP.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CSTPP.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "CSTPP.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CSTAT.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "CSTAT.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CXTAT.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "CXTAT.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CSTMH.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "CSTMH.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "CXTMH.230.467 and later", "status": "unaffected" } ], "lessThanOrEqual": "CXTMH.230.466", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.TL2.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.TL2.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.PR2.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.PR2.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.PR4.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.PR4.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.SB4.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.SB4.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.SB7.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.SB7.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.DN2.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.DN2.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.DN4.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.DN4.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.DN7.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.DN7.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.TU.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.TU.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.SA.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.SA.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.MG.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.MG.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.GM7.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.GM7.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.GM4.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.GM4.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW90.VY4.P225 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW90.VY4.P224", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW80.PRL.P261 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW80.PRL.P260", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW80.SB2.P261 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW80.SB2.P260", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW80.VYL.P261 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW80.VYL.P260", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW80.VY2.P261 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW80.VY2.P260", "status": "affected", "version": "0", "versionType": "custom" }, { "changes": [ { "at": "LW80.GM2.P261 and later", "status": "unaffected" } ], "lessThanOrEqual": "LW80.GM2.P260", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A Server-Side Request Forgery (SSRF) vulnerability has been identified in the embedded web server in various Lexmark devices. This vulnerability can be leveraged by an attacker to force the device to send an arbitrary HTTP request to a third-party server.\u0026nbsp;Successful exploitation of this vulnerability can lead to internal network access / potential data disclosure from a device." } ], "value": "A Server-Side Request Forgery (SSRF) vulnerability has been identified in the embedded web server in various Lexmark devices. This vulnerability can be leveraged by an attacker to force the device to send an arbitrary HTTP request to a third-party server.\u00a0Successful exploitation of this vulnerability can lead to internal network access / potential data disclosure from a device." } ], "impacts": [ { "capecId": "CAPEC-101", "descriptions": [ { "lang": "en", "value": "CAPEC-101 Server Side Include (SSI) Injection" } ] }, { "capecId": "CAPEC-33", "descriptions": [ { "lang": "en", "value": "CAPEC-33: HTTP Request Smuggling" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.9, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-29T15:34:06.094Z", "orgId": "7bc73191-a2b6-4c63-9918-753964601853", "shortName": "Lexmark" }, "references": [ { "url": "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Server-Side Request Forgery (SSRF) vulnerability found in embedded web server", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7bc73191-a2b6-4c63-9918-753964601853", "assignerShortName": "Lexmark", "cveId": "CVE-2025-9269", "datePublished": "2025-09-09T17:21:36.589Z", "dateReserved": "2025-08-20T15:10:24.655Z", "dateUpdated": "2025-09-29T15:34:06.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…