CVE-2025-65078
Untrusted Search Path in Lexmark Embedded Framework Enables Code Execution
Publication date: 2026-02-03
Last updated on: 2026-02-03
Assigner: Lexmark International
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| lexmark | embedded_solutions_framework | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-426 | The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an untrusted search path issue found in the Embedded Solutions Framework of various Lexmark devices. It allows an attacker to execute arbitrary code by exploiting the way the system searches for files or executables, potentially running malicious code instead of the intended one.
How can this vulnerability impact me? :
The vulnerability can lead to an attacker executing arbitrary code on affected Lexmark devices without requiring any privileges or user interaction. This could result in unauthorized control over the device, data compromise, or disruption of services.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know