VYPR
Medium severityNVD Advisory· Published Feb 3, 2026· Updated Apr 15, 2026

CVE-2025-65080

CVE-2025-65080

Description

A type confusion vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A type confusion in Lexmark PostScript interpreter allows unauthenticated code execution as an unprivileged user.

Vulnerability

Details

CVE-2025-65080 is a type confusion vulnerability found in the PostScript interpreter of various Lexmark printers and multifunction devices. This programming error occurs when the interpreter incorrectly handles object types during PostScript processing, leading to memory corruption that can be leveraged for arbitrary code execution. The flaw resides in the interpreter's internal type-checking logic, which fails to properly validate object type identifiers before performing operations on them [1].

Exploitation

Vector

An attacker can exploit this vulnerability by sending a specially crafted PostScript file to the device's print or processing service. No authentication is required, as the PostScript interpreter typically accepts jobs from any network client by default in many configurations. The attack can be delivered over the network via standard printing protocols (e.g., LPD, IPP) or via the embedded web server's print submission interface. Successful exploitation does not require any prior knowledge of the device beyond its network address [1].

Impact

If exploited, the vulnerability allows an attacker to execute arbitrary code in the context of an unprivileged user. While this limits direct access to system-level functions, the attacker can still potentially modify print jobs, access network file shares accessible to the device, or use the device as a foothold for lateral movement within the organization. Lexmark rates the severity as Medium (CVSS base score assigned internally) [1].

Remediation

Lexmark has released firmware updates that address this vulnerability in its security advisories portal. Administrators should apply the latest firmware for affected models immediately. As a workaround, restricting network access to the device's printing services via firewall rules or disabling PostScript support if not required can reduce exposure. No evidence of active exploitation has been reported at the time of publication, but public disclosure increases the likelihood of attacker interest [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.