Lexmark Security Advisory:
Statement regarding speculative execution vulnerabilities on Lexmark devices.
CVE: CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754
Some Lexmark devices may contain CPUs that are affected by the speculative execution vulnerabilities known as Spectre (CVE-2017-5753 and CVE-2017-5715) and Meltdown (CVE-2017-5754). However, there is no known path to exploit these vulnerabilities on a Lexmark device.
On January 3, 2018, vulnerabilities were reported in several CPUs that perform speculative execution. The vulnerabilities could at worst be used by an attacker to read arbitrary virtual memory across security boundaries. Several classes of processors have been identified as affected, including those from Intel, AMD, ARM, and IBM.
There are several variants of this speculative execution flaw. The first two, CVE-2017-5753 and CVE-2017-5715, are known as Spectre, and the third, CVE-2017-5754, is known as Meltdown. These are all variants of the same attack and differ in the way the CPU flaw is exploited.
To exploit any of these vulnerabilities, three conditions must be met:
- The CPU in use must contain the speculative execution vulnerability,
- The device must allow custom code execution, and
- A high-resolution timer must be available to distinguish between cache hits and misses
Relevance to Lexmark Devices:
Many Lexmark devices utilize speculative execution of instructions to optimize device performance. Several Lexmark devices contain a CPU which may be vulnerable to the Spectre and Meltdown vulnerabilities.
Lexmark devices, however, include protections which mitigate the risk of these vulnerabilities. These include limiting the code that can be executed by the firmware and preventing access to high resolution timers.
The following section provides technical details.
Limits On Custom Code Execution:
To exploit the Spectre vulnerability one must be able to run custom code on an affected device. Lexmark printers, depending on the model, have the ability to execute the following types of code:
- Lexmark Firmware & Embedded Solutions
- Printer Datastream Languages
- Cloud Solutions
Lexmark Firmware & Embedded Solutions:
Lexmark has designed its firmware and Embedded Solutions such that only code bearing a Lexmark digital signature can be executed. The integrity of the firmware is continuously verified at runtime. This design blocks the execution of arbitrary code, which in turn protects Lexmark devices from threats of this type.
Printer Datastream Languages:
Inherent in the design of some Printer Datastream Languages are instructions that are interpreted. Such interpreted instructions are not converted to native instructions, and are limited by definition in what actions can be performed. One such limitation is that there is no access to high resolution timers needed to exploit the Spectre and Meltdown vulnerabilities.
Lexmark devices are not vulnerable to the Meltdown or Spectre vulnerabilities. While some devices may contain CPUs which are vulnerable to Spectre and Meltdown, security measures used in Lexmark devices mitigate the risk of these vulnerabilities. Because Lexmark devices are not vulnerable to these threats, no firmware updates are planned.
|1.0||18-January 2018||Initial Public Release|
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND IS PROVIDED WITHOUT ANY EXPRESS OR IMPLIED GUARANTEE OR WARRANTY WHATSOEVER, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR USE OR PURPOSE. LEXMARK RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.