CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2019-10058

Various Lexmark products have Incorrect Access Control.
Publish Date : 2019-08-28 Last Update Date : 2019-08-29
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
6.4
Confidentiality Impact Partial (There is considerable informational disclosure.)
Integrity Impact Partial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability Impact None (There is no impact to the availability of the system.)
Access Complexity Low (Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. )
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s)
CWE ID 284

- Products Affected By CVE-2019-10058

# Product Type Vendor Product Version Update Edition Language
1 OS Lexmark 6500e Firmware Lhs60.jr.p705 Version Details Vulnerabilities
2 OS Lexmark C734 Firmware Lr.sk.p815 Version Details Vulnerabilities
3 OS Lexmark C736 Firmware Lr.ske.p815 Version Details Vulnerabilities
4 OS Lexmark C746 Firmware Lhs60.cm2.p705 Version Details Vulnerabilities
5 OS Lexmark C748 Firmware Lhs60.cm4.p705 Version Details Vulnerabilities
6 OS Lexmark C792 Firmware Lhs60.hc.p705 Version Details Vulnerabilities
7 OS Lexmark C925 Firmware Lhs60.hv.p705 Version Details Vulnerabilities
8 OS Lexmark C950 Firmware Lhs60.tp.p705 Version Details Vulnerabilities
9 OS Lexmark Cs31x Firmware Lw71.vyl.p229 Version Details Vulnerabilities
10 OS Lexmark Cs41x Firmware Lw71.vy2.p229 Version Details Vulnerabilities
11 OS Lexmark Cs51x Firmware Lw71.vy4.p229 Version Details Vulnerabilities
12 OS Lexmark Cs748 Firmware Lhs60.cm4.p705 Version Details Vulnerabilities
13 OS Lexmark Cs796 Firmware Lhs60.hc.p705 Version Details Vulnerabilities
14 OS Lexmark Cx310 Firmware Lw71.gm2.p229 Version Details Vulnerabilities
15 OS Lexmark E46x Firmware Lr.lbh.p815 Version Details Vulnerabilities
16 OS Lexmark M1140 Firmware Lw71.prl.p229 Version Details Vulnerabilities
17 OS Lexmark M1145 Firmware Lw71.pr2.p229 Version Details Vulnerabilities
18 OS Lexmark M3150 Firmware Lw71.pr4.p229 Version Details Vulnerabilities
19 OS Lexmark M3150dn Firmware Lw71.pr2.p229 Version Details Vulnerabilities
20 OS Lexmark M5155 Firmware Lw71.dn4.p229 Version Details Vulnerabilities
21 OS Lexmark M5163 Firmware Lw71.dn4.p229 Version Details Vulnerabilities
22 OS Lexmark M5163dn Firmware Lw71.dn2.p229 Version Details Vulnerabilities
23 OS Lexmark M5170 Firmware Lw71.dn7.p229 Version Details Vulnerabilities
24 OS Lexmark Ms310 Firmware Lw71.prl.p229 Version Details Vulnerabilities
25 OS Lexmark Ms312 Firmware Lw71.prl.p229 Version Details Vulnerabilities
26 OS Lexmark Ms315 Firmware Lw71.tl2.p229 Version Details Vulnerabilities
27 OS Lexmark Ms317 Firmware Lw71.prl.p229 Version Details Vulnerabilities
28 OS Lexmark Ms410 Firmware Lw71.prl.p229 Version Details Vulnerabilities
29 OS Lexmark Ms415 Firmware Lw71.tl2.p229 Version Details Vulnerabilities
30 OS Lexmark Ms417 Firmware Lw71.tl2.p229 Version Details Vulnerabilities
31 OS Lexmark Ms51x Firmware Lw71.pr2.p229 Version Details Vulnerabilities
32 OS Lexmark Ms610de Firmware Lw71.pr4.p229 Version Details Vulnerabilities
33 OS Lexmark Ms610dn Firmware Lw71.pr2.p229 Version Details Vulnerabilities
34 OS Lexmark Ms617 Firmware Lw71.pr2.p229 Version Details Vulnerabilities
35 OS Lexmark Ms71x Firmware Lw71.dn2.p229 Version Details Vulnerabilities
36 OS Lexmark Ms810 Firmware Lw71.dn2.p229 Version Details Vulnerabilities
37 OS Lexmark Ms810de Firmware Lw71.dn4.p229 Version Details Vulnerabilities
38 OS Lexmark Ms811 Firmware Lw71.dn2.p229 Version Details Vulnerabilities
39 OS Lexmark Ms812 Firmware Lw71.dn2.p229 Version Details Vulnerabilities
40 OS Lexmark Ms812de Firmware Lw71.dn7.p229 Version Details Vulnerabilities
41 OS Lexmark Ms817 Firmware Lw71.dn2.p229 Version Details Vulnerabilities
42 OS Lexmark Ms818 Firmware Lw71.dn2.p229 Version Details Vulnerabilities
43 OS Lexmark Ms91x Firmware Lw71.sa.p229 Version Details Vulnerabilities
44 OS Lexmark Mx31x Firmware Lw71.sb2.p229 Version Details Vulnerabilities
45 OS Lexmark Mx410 Firmware Lw71.sb4.p229 Version Details Vulnerabilities
46 OS Lexmark Mx510 Firmware Lw71.sb4.p229 Version Details Vulnerabilities
47 OS Lexmark Mx511 Firmware Lw71.sb4.p229 Version Details Vulnerabilities
48 OS Lexmark Mx610 Firmware Lw71.sb7.p229 Version Details Vulnerabilities
49 OS Lexmark Mx611 Firmware Lw71.sb7.p229 Version Details Vulnerabilities
50 OS Lexmark Mx6500e Firmware Lw71.jd.p229 Version Details Vulnerabilities
51 OS Lexmark Mx71x Firmware Lw71.tu.p229 Version Details Vulnerabilities
52 OS Lexmark Mx81x Firmware Lw71.tu.p229 Version Details Vulnerabilities
53 OS Lexmark Mx91x Firmware Lw71.mg.p229 Version Details Vulnerabilities
54 OS Lexmark T65x Firmware Lr.jp.p815 Version Details Vulnerabilities
55 OS Lexmark W850 Firmware Lp.jb.p815 Version Details Vulnerabilities
56 OS Lexmark X46x Firmware Lr.bs.p815 Version Details Vulnerabilities
57 OS Lexmark X548 Firmware Lhs60.vk.p705 Version Details Vulnerabilities
58 OS Lexmark X65x Firmware Lr.mn.p815 Version Details Vulnerabilities
59 OS Lexmark X73x Firmware Lr.fl.p815 Version Details Vulnerabilities
60 OS Lexmark X74x Firmware Lhs60.ny.p705 Version Details Vulnerabilities
61 OS Lexmark X792 Firmware Lhs60.mr.p705 Version Details Vulnerabilities
62 OS Lexmark X86x Firmware Lp.sp.p815 Version Details Vulnerabilities
63 OS Lexmark X925 Firmware Lhs60.hk.p705 Version Details Vulnerabilities
64 OS Lexmark X95x Firmware Lhs60.tq.p705 Version Details Vulnerabilities
65 OS Lexmark Xm1135 Firmware Lw71.sb2.p229 Version Details Vulnerabilities
66 OS Lexmark Xm3150 Firmware Lw71.sb7.p229 Version Details Vulnerabilities
67 OS Lexmark Xm51xx Firmware Lw71.tu.p229 Version Details Vulnerabilities
68 OS Lexmark Xm71xx Firmware Lw71.tu.p229 Version Details Vulnerabilities
69 OS Lexmark Xm91x Firmware Lw71.mg.p229 Version Details Vulnerabilities
70 OS Lexmark Xs548 Firmware Lhs60.vk.p705 Version Details Vulnerabilities
71 OS Lexmark Xs748 Firmware Lhs60.ny.p705 Version Details Vulnerabilities
72 OS Lexmark Xs79x Firmware Lhs60.mr.p705 Version Details Vulnerabilities
73 OS Lexmark Xs925 Firmware Lhs60.hk.p705 Version Details Vulnerabilities
74 OS Lexmark Xs95x Firmware Lhs60.tq.p705 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Lexmark 6500e Firmware 1
Lexmark C734 Firmware 1
Lexmark C736 Firmware 1
Lexmark C746 Firmware 1
Lexmark C748 Firmware 1
Lexmark C792 Firmware 1
Lexmark C925 Firmware 1
Lexmark C950 Firmware 1
Lexmark Cs31x Firmware 1
Lexmark Cs41x Firmware 1
Lexmark Cs51x Firmware 1
Lexmark Cs748 Firmware 1
Lexmark Cs796 Firmware 1
Lexmark Cx310 Firmware 1
Lexmark E46x Firmware 1
Lexmark M1140 Firmware 1
Lexmark M1145 Firmware 1
Lexmark M3150 Firmware 1
Lexmark M3150dn Firmware 1
Lexmark M5155 Firmware 1
Lexmark M5163 Firmware 1
Lexmark M5163dn Firmware 1
Lexmark M5170 Firmware 1
Lexmark Ms310 Firmware 1
Lexmark Ms312 Firmware 1
Lexmark Ms315 Firmware 1
Lexmark Ms317 Firmware 1
Lexmark Ms410 Firmware 1
Lexmark Ms415 Firmware 1
Lexmark Ms417 Firmware 1
Lexmark Ms51x Firmware 1
Lexmark Ms610de Firmware 1
Lexmark Ms610dn Firmware 1
Lexmark Ms617 Firmware 1
Lexmark Ms71x Firmware 1
Lexmark Ms810 Firmware 1
Lexmark Ms810de Firmware 1
Lexmark Ms811 Firmware 1
Lexmark Ms812 Firmware 1
Lexmark Ms812de Firmware 1
Lexmark Ms817 Firmware 1
Lexmark Ms818 Firmware 1
Lexmark Ms91x Firmware 1
Lexmark Mx31x Firmware 1
Lexmark Mx410 Firmware 1
Lexmark Mx510 Firmware 1
Lexmark Mx511 Firmware 1
Lexmark Mx610 Firmware 1
Lexmark Mx611 Firmware 1
Lexmark Mx6500e Firmware 1
Lexmark Mx71x Firmware 1
Lexmark Mx81x Firmware 1
Lexmark Mx91x Firmware 1
Lexmark T65x Firmware 1
Lexmark W850 Firmware 1
Lexmark X46x Firmware 1
Lexmark X548 Firmware 1
Lexmark X65x Firmware 1
Lexmark X73x Firmware 1
Lexmark X74x Firmware 1
Lexmark X792 Firmware 1
Lexmark X86x Firmware 1
Lexmark X925 Firmware 1
Lexmark X95x Firmware 1
Lexmark Xm1135 Firmware 1
Lexmark Xm3150 Firmware 1
Lexmark Xm51xx Firmware 1
Lexmark Xm71xx Firmware 1
Lexmark Xm91x Firmware 1
Lexmark Xs548 Firmware 1
Lexmark Xs748 Firmware 1
Lexmark Xs79x Firmware 1
Lexmark Xs925 Firmware 1
Lexmark Xs95x Firmware 1

- References For CVE-2019-10058

http://support.lexmark.com/index?page=content&id=TE922&locale=EN&userlocale=EN_US CONFIRM

- Vulnerability Conditions

Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)
Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)

- Metasploit Modules Related To CVE-2019-10058

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.