CVE-2022-24291

7.5 HIGH

📋 TL;DR

This vulnerability in certain HP Print devices could allow attackers to access sensitive information, disrupt printing services, or potentially execute malicious code remotely. It affects HP printers with specific firmware versions that are exposed to network access.

💻 Affected Systems

Products:
  • HP LaserJet Pro printers
  • HP Color LaserJet Pro printers
  • HP PageWide Pro printers
Versions: Firmware versions prior to 2022.04.21
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects printers with web management interface enabled and network connectivity.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Information disclosure exposing sensitive printer data and configuration details, potentially enabling further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls in place.

🌐 Internet-Facing: HIGH - Printers directly exposed to the internet are highly vulnerable to exploitation attempts.
🏢 Internal Only: MEDIUM - Internal network exposure still presents risk from compromised internal hosts or malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on CVSS score and description, exploitation appears straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version 2022.04.21 or later

Vendor Advisory: https://support.hp.com/us-en/document/ish_5950417-5950443-16

Restart Required: Yes

Instructions:

1. Access printer web interface. 2. Navigate to firmware update section. 3. Download latest firmware from HP support site. 4. Upload and install firmware update. 5. Reboot printer after installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate printers on separate VLAN with restricted access

Disable Web Interface

all

Turn off printer web management interface if not required

🧯 If You Can't Patch

  • Implement strict network access controls to limit printer exposure
  • Monitor printer network traffic for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check printer firmware version via web interface or control panel. Compare against vulnerable versions.

Check Version:

Access printer web interface at http://[printer-ip] and navigate to Information or Settings page

Verify Fix Applied:

Confirm firmware version is 2022.04.21 or later and test web interface functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual web interface access patterns
  • Multiple failed authentication attempts
  • Unexpected firmware modification attempts

Network Indicators:

  • Unusual traffic to printer web ports (80/443)
  • Suspicious HTTP requests to printer management endpoints

SIEM Query:

source="printer_logs" AND (event="web_access" OR event="auth_failure") | stats count by src_ip

🔗 References

📤 Share & Export