Wednesday, April 2, 2025
HomeCVE/vulnerabilityHundreds of HP Printer Models Affected by Critical Remote Code Execution

Hundreds of HP Printer Models Affected by Critical Remote Code Execution

Published on

SIEM as a Service

Follow Us on Google News

A number of HP printer models, including LaserJet Pro, Pagewide Pro, OfficeJet, Enterprise, Large Format, and DeskJet, have been updated recently to address three security issues rated as critical.

Initially, there is a buffer overflow security flaw that could allow remote code execution on an affected computer. Trend Micro’s Zero Day Initiative team reported this security flaw, which is tracked as CVE-2022-3942.

HP lists the severity of the bug as critical, even though it comes with a CVSS severity score of 8.4 (high). Furthermore, HP published mitigation methods for this problem, such as disabling LLMNR.

The advisory stated:-

“Certain HP Print products and Digital Sending products may be vulnerable to potential remote code execution and buffer overflow with the use of Link-Local Multicast Name Resolution or LLMNR.”

The Second Set of Vulnerabilities

Here below we have mentioned the second set of vulnerabilities detected:-

  • CVE-2022-24292 (CVSS score 9.8)
  • CVE-2022-24293 (CVSS score 9.8)
  • CVE-2022-24291 (CVSS score 7.5)

Using the embedded web server (EWS) for LaserJet Pro, you can disable unused protocols. For other products, take a look at this guide.

One of the listed LaserJet Pro models does not appear to have been advised to take mitigation action, however, it has been marked as pending, so the security updates for that one should soon be available.

In order to download the latest available version of the firmware for all other models, please visit HP’s official software and driver download portal, navigate to the appropriate model, and select it.

However, these vulnerabilities have not been widely discussed, but the repercussions of remote code execution and information disclosure are likely to be substantial and damaging.

While the severity levels point to the need to apply security updates as soon as possible, to restrict remote access, and to put the devices behind a firewall.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Brinker Named Among “10 Most Promising Defense Tech Startups of 2025”

Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has...

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the...

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB),...

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the...

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB),...

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other...