CVE-2019-16240

9.1 CRITICAL

📋 TL;DR

This CVE describes a buffer overflow and information disclosure vulnerability in certain HP OfficeJet Pro, PageWide Managed, and PageWide Pro printers. Attackers can exploit this by sending malicious print files, potentially causing the printer to crash and leak sensitive memory contents. Organizations using affected HP inkjet printer models are at risk.

💻 Affected Systems

Products:
  • HP OfficeJet Pro Printers
  • HP PageWide Managed Printers
  • HP PageWide Pro Printers
Versions: OfficeJet Pro: before 001.1937C, PageWide Managed/Pro: before 001.1937D
Operating Systems: Printer firmware only
Default Config Vulnerable: ⚠️ Yes
Notes: Only specific HP inkjet printer models are affected; laser printers and other brands are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete printer compromise, data exfiltration, and potential lateral movement to connected networks.

🟠

Likely Case

Printer denial of service through crashes and potential information disclosure via memory dumps containing sensitive data.

🟢

If Mitigated

Limited impact with proper network segmentation and print job filtering, though printers may still crash.

🌐 Internet-Facing: HIGH - Printers exposed to internet could be directly targeted with malicious print jobs.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit via network printing protocols.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted print files via network printing protocols.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OfficeJet Pro: 001.1937C or later, PageWide Managed/Pro: 001.1937D or later

Vendor Advisory: https://support.hp.com/us-en/document/c06458150

Restart Required: Yes

Instructions:

1. Access printer web interface or control panel. 2. Navigate to firmware update section. 3. Download and install firmware version 001.1937C (OfficeJet Pro) or 001.1937D (PageWide). 4. Reboot printer after installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate printers on separate VLANs with restricted access to prevent unauthorized print jobs.

Print Job Filtering

all

Implement print server filtering to block suspicious print jobs before they reach vulnerable printers.

🧯 If You Can't Patch

  • Disable network printing and require physical USB connections only
  • Implement strict firewall rules to allow printing only from trusted IP addresses

🔍 How to Verify

Check if Vulnerable:

Check printer firmware version via web interface or control panel. If version is below 001.1937C (OfficeJet Pro) or 001.1937D (PageWide), the device is vulnerable.

Check Version:

Check via printer web interface at http://[printer-ip]/#hId-pgFirmware or printer control panel under Settings > System > Service > Firmware Version

Verify Fix Applied:

Confirm firmware version shows 001.1937C or higher (OfficeJet Pro) or 001.1937D or higher (PageWide) after update.

📡 Detection & Monitoring

Log Indicators:

  • Printer crash/reboot events
  • Unusual print job failures
  • Memory dump file creation on printer storage

Network Indicators:

  • Unusual print job traffic patterns
  • Print jobs from unexpected sources
  • Protocol anomalies in print spooler communications

SIEM Query:

source="printer_logs" AND (event="crash" OR event="reboot" OR event="memory_dump")

🔗 References

📤 Share & Export