## https://sploitus.com/exploit?id=C3C92D33-EE4A-5915-A66B-4F11104E6737
# PoC for CVE-2023-22960
[](https://www.python.org/)
<img src="https://img.shields.io/badge/Developed%20on-kali%20linux-blueviolet">
[](https://github.com/t3l3machus/CVE-2023-22960/blob/main/LICENSE)
## Details
This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.
**Official security advisory** -> https://publications.lexmark.com/publications/security-alerts/CVE-2023-22960.pdf
**PoC tested against**:
- Lexmark MX622adhe
- Lexmark CX735adse
- Lexmark MX521ade
#### Video Presentation
In this video I demonstrate the issue as well as how to write an http(s) login bruteforce script with Python.
https://www.youtube.com/watch?v=HuAqTScr_3s
## Preview
Without the brute-force prevention bypass:

Applying the the brute-force prevention bypass:
