Lexmark Printer config.html Administrator Authentication Bypass (FREAK)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote printer is affected by a security bypass vulnerability
known as FREAK.

Description :

According to its firmware version, the remote Lexmark printer is
affected by a security feature bypass vulnerability, known as FREAK
(Factoring attack on RSA-EXPORT Keys), due to the support of weak
EXPORT_RSA cipher suites with keys less than or equal to 512 bits. A
man-in-the-middle attacker may be able to downgrade the SSL/TLS
connection to use EXPORT_RSA cipher suites which can be factored in a
short amount of time, allowing the attacker to intercept and decrypt
the traffic.

See also :

http://www.nessus.org/u?60f299d0
https://www.smacktls.com/#freak

Solution :

Upgrade to a fixed release as referenced in the vendor advisory.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 86426 ()

Bugtraq ID: 71936
72965

CVE ID: CVE-2015-0204
CVE-2015-1637

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now