Hundreds of HP Printer Models Affected by Critical Remote Code Execution

A number of HP printer models, including LaserJet Pro, Pagewide Pro, OfficeJet, Enterprise, Large Format, and DeskJet, have been updated recently to address three security issues rated as critical.

Initially, there is a buffer overflow security flaw that could allow remote code execution on an affected computer. Trend Micro’s Zero Day Initiative team reported this security flaw, which is tracked as CVE-2022-3942.

HP lists the severity of the bug as critical, even though it comes with a CVSS severity score of 8.4 (high). Furthermore, HP published mitigation methods for this problem, such as disabling LLMNR.

The advisory stated:-

“Certain HP Print products and Digital Sending products may be vulnerable to potential remote code execution and buffer overflow with the use of Link-Local Multicast Name Resolution or LLMNR.”

The Second Set of Vulnerabilities

Here below we have mentioned the second set of vulnerabilities detected:-

  • CVE-2022-24292 (CVSS score 9.8)
  • CVE-2022-24293 (CVSS score 9.8)
  • CVE-2022-24291 (CVSS score 7.5)

Using the embedded web server (EWS) for LaserJet Pro, you can disable unused protocols. For other products, take a look at this guide.

One of the listed LaserJet Pro models does not appear to have been advised to take mitigation action, however, it has been marked as pending, so the security updates for that one should soon be available.

In order to download the latest available version of the firmware for all other models, please visit HP’s official software and driver download portal, navigate to the appropriate model, and select it.

However, these vulnerabilities have not been widely discussed, but the repercussions of remote code execution and information disclosure are likely to be substantial and damaging.

While the severity levels point to the need to apply security updates as soon as possible, to restrict remote access, and to put the devices behind a firewall.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Guru baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploiting Docusign With Phishing Attack To Steal Credentials

Hackers prefer phishing as it exploits human vulnerabilities rather than technical flaws which make it a highly effective and low-cost…

16 hours ago

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS)…

2 days ago

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target…

2 days ago

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts…

2 days ago

Santander Data Breach: Hackers Accessed Company Database

Santander has confirmed that there was a major data breach that affected its workers and customers in Spain, Uruguay, and…

2 days ago

U.S. Govt Announces Rewards up to $5 Million for North Korean IT Workers

The U.S. government has offered a prize of up to $5 million for information that leads to the arrest and…

3 days ago