Hundreds of HP Printer Models Affected by Critical Remote Code Execution

A number of HP printer models, including LaserJet Pro, Pagewide Pro, OfficeJet, Enterprise, Large Format, and DeskJet, have been updated recently to address three security issues rated as critical.

Initially, there is a buffer overflow security flaw that could allow remote code execution on an affected computer. Trend Micro’s Zero Day Initiative team reported this security flaw, which is tracked as CVE-2022-3942.

HP lists the severity of the bug as critical, even though it comes with a CVSS severity score of 8.4 (high). Furthermore, HP published mitigation methods for this problem, such as disabling LLMNR.

The advisory stated:-

“Certain HP Print products and Digital Sending products may be vulnerable to potential remote code execution and buffer overflow with the use of Link-Local Multicast Name Resolution or LLMNR.”

The Second Set of Vulnerabilities

Here below we have mentioned the second set of vulnerabilities detected:-

  • CVE-2022-24292 (CVSS score 9.8)
  • CVE-2022-24293 (CVSS score 9.8)
  • CVE-2022-24291 (CVSS score 7.5)

Using the embedded web server (EWS) for LaserJet Pro, you can disable unused protocols. For other products, take a look at this guide.

One of the listed LaserJet Pro models does not appear to have been advised to take mitigation action, however, it has been marked as pending, so the security updates for that one should soon be available.

In order to download the latest available version of the firmware for all other models, please visit HP’s official software and driver download portal, navigate to the appropriate model, and select it.

However, these vulnerabilities have not been widely discussed, but the repercussions of remote code execution and information disclosure are likely to be substantial and damaging.

While the severity levels point to the need to apply security updates as soon as possible, to restrict remote access, and to put the devices behind a firewall.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed…

2 hours ago

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria Stealer,"…

2 hours ago

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass,…

2 hours ago

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated…

2 hours ago

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations designed…

2 hours ago

Cybercriminals Exploit Public-Facing IIS, Apache, and SQL Servers to Breach Gov & Telecom Systems

A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated, state-sponsored…

2 hours ago