CVE-2019-10627

9.8 CRITICAL

📋 TL;DR

This CVE describes an integer overflow vulnerability in PostScript/PDF image handling code that leads to buffer overflow. It affects PostScript and PDF printers using IPS versions before 2019.2. Attackers could exploit this to execute arbitrary code or cause denial of service.

💻 Affected Systems

Products:
  • HP printers with PostScript/PDF support
  • Qualcomm-based printers
  • Other printers using IPS interpreter
Versions: IPS versions prior to 2019.2
Operating Systems: Embedded printer OS, Windows print servers, Linux print servers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects printers with PostScript or PDF printing enabled. Print servers processing PostScript/PDF files may also be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/root privileges leading to complete system compromise, lateral movement, and persistent access.

🟠

Likely Case

Denial of service (printer/service crash) or limited code execution in printer context.

🟢

If Mitigated

Denial of service only if memory protections (ASLR/DEP) partially mitigate.

🌐 Internet-Facing: HIGH - Printers exposed to internet could be directly attacked via print jobs.
🏢 Internal Only: MEDIUM - Requires internal network access but print services are commonly accessible.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending malicious PostScript/PDF files to vulnerable printers. No public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IPS 2019.2 or later

Vendor Advisory: https://support.hp.com/us-en/document/c06458150

Restart Required: Yes

Instructions:

1. Check printer firmware version. 2. Download IPS 2019.2+ firmware from HP/Qualcomm. 3. Apply firmware update via printer web interface or management tool. 4. Restart printer to complete installation.

🔧 Temporary Workarounds

Disable PostScript/PDF printing

all

Disable vulnerable PostScript and PDF interpreters if not required.

Printer-specific: Disable PostScript/PDF via web interface or print server settings

Network segmentation

all

Isolate printers to separate VLAN with restricted access.

Network switch: Configure VLANs and ACLs to restrict printer access

🧯 If You Can't Patch

  • Implement strict network access controls to limit printer access to trusted hosts only.
  • Monitor print queues for suspicious PostScript/PDF files and implement file type filtering.

🔍 How to Verify

Check if Vulnerable:

Check printer firmware version via web interface (typically http://printer-ip) or management console. Look for IPS version.

Check Version:

Printer-specific: Use SNMP (snmpget -v2c -c public printer-ip 1.3.6.1.2.1.25.6.3.1.2) or check web interface

Verify Fix Applied:

Confirm firmware version shows IPS 2019.2 or later after update.

📡 Detection & Monitoring

Log Indicators:

  • Printer crash logs
  • Failed print jobs with PostScript/PDF errors
  • Memory allocation failures in printer logs

Network Indicators:

  • Unusual print job traffic to printers
  • Large PostScript/PDF files sent to printers

SIEM Query:

source="printer_logs" AND ("crash" OR "memory" OR "PostScript error")

🔗 References

📤 Share & Export