CVE-2022-24292

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in certain HP Print devices allows attackers to potentially execute arbitrary code remotely, leading to information disclosure or denial of service. Affected organizations using vulnerable HP printer models are at risk, particularly those with internet-facing devices.

💻 Affected Systems

Products:
  • HP LaserJet Pro
  • HP LaserJet Enterprise
  • HP PageWide
  • HP OfficeJet Pro
Versions: Firmware versions prior to 2022.04.01
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Specific models listed in HP advisory; requires network access to printer management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to internal networks, and persistent access to sensitive data.

🟠

Likely Case

Denial of service attacks disrupting printing services and potential information disclosure from device logs or configurations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting printing functionality.

🌐 Internet-Facing: HIGH - Printers directly accessible from the internet are extremely vulnerable to remote exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on CVSS 9.8 score, exploitation likely requires minimal technical skill once details are public.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware 2022.04.01 or later

Vendor Advisory: https://support.hp.com/us-en/document/ish_5950417-5950443-16

Restart Required: Yes

Instructions:

1. Download latest firmware from HP support site. 2. Access printer web interface. 3. Navigate to firmware update section. 4. Upload and install new firmware. 5. Reboot printer after installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate printers on separate VLAN with restricted access

Access Control Lists

linux

Implement firewall rules to restrict printer management interface access

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Disable remote management features and web interface if not required
  • Implement strict network access controls to limit printer exposure

🔍 How to Verify

Check if Vulnerable:

Check firmware version in printer web interface under System Information or Configuration pages

Check Version:

curl -s http://printer-ip/hp/device/info_configuration.html | grep Firmware

Verify Fix Applied:

Confirm firmware version is 2022.04.01 or later in printer management interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to printer web interface
  • Multiple failed firmware update attempts
  • Unexpected configuration changes

Network Indicators:

  • Unusual traffic patterns to printer management ports (80, 443, 9100)
  • Exploit-specific payloads in HTTP requests to printer

SIEM Query:

source="printer_logs" AND (event="authentication_failure" OR event="firmware_update")

🔗 References

📤 Share & Export