Monday, December 4, 2023

Hundreds of HP Printer Models Affected by Critical Remote Code Execution

A number of HP printer models, including LaserJet Pro, Pagewide Pro, OfficeJet, Enterprise, Large Format, and DeskJet, have been updated recently to address three security issues rated as critical.

Initially, there is a buffer overflow security flaw that could allow remote code execution on an affected computer. Trend Micro’s Zero Day Initiative team reported this security flaw, which is tracked as CVE-2022-3942.

HP lists the severity of the bug as critical, even though it comes with a CVSS severity score of 8.4 (high). Furthermore, HP published mitigation methods for this problem, such as disabling LLMNR.

The advisory stated:-

“Certain HP Print products and Digital Sending products may be vulnerable to potential remote code execution and buffer overflow with the use of Link-Local Multicast Name Resolution or LLMNR.”

The Second Set of Vulnerabilities

Here below we have mentioned the second set of vulnerabilities detected:-

  • CVE-2022-24292 (CVSS score 9.8)
  • CVE-2022-24293 (CVSS score 9.8)
  • CVE-2022-24291 (CVSS score 7.5)

Using the embedded web server (EWS) for LaserJet Pro, you can disable unused protocols. For other products, take a look at this guide.

One of the listed LaserJet Pro models does not appear to have been advised to take mitigation action, however, it has been marked as pending, so the security updates for that one should soon be available.

In order to download the latest available version of the firmware for all other models, please visit HP’s official software and driver download portal, navigate to the appropriate model, and select it.

However, these vulnerabilities have not been widely discussed, but the repercussions of remote code execution and information disclosure are likely to be substantial and damaging.

While the severity levels point to the need to apply security updates as soon as possible, to restrict remote access, and to put the devices behind a firewall.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles