CVE-2023-4063

5.3 MEDIUM

📋 TL;DR

HP OfficeJet Pro printers are vulnerable to a Denial of Service attack when receiving a specially crafted eSCL URL GET request. This vulnerability allows attackers to crash the printer's web service, making it temporarily unavailable for printing or management. Only specific HP OfficeJet Pro models with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • HP OfficeJet Pro printers
Versions: Firmware versions prior to 2023.10.17
Operating Systems: Printer firmware only
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects printers with eSCL (eSCL scanning protocol) enabled, which is typically enabled by default for scanning functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Printer becomes completely unresponsive, requiring physical power cycle to restore functionality, disrupting printing operations for extended periods.

🟠

Likely Case

Temporary service interruption where printer web interface becomes unavailable but printing may continue via other protocols, requiring reboot to restore full functionality.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting who can send requests to printer management interfaces.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to printer's web interface and knowledge of vulnerable eSCL endpoint URLs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version 2023.10.17 or later

Vendor Advisory: https://support.hp.com/us-en/document/ish_10321463-10321488-16/hpsbpi03927

Restart Required: Yes

Instructions:

1. Access printer web interface. 2. Navigate to Settings > Updates. 3. Check for firmware updates. 4. Apply firmware version 2023.10.17 or later. 5. Printer will automatically restart after update.

🔧 Temporary Workarounds

Disable eSCL Protocol

all

Temporarily disable the eSCL scanning protocol to prevent exploitation while awaiting patch

Access printer web interface > Settings > Network > eSCL > Disable

Network Segmentation

all

Restrict network access to printer management interfaces

Configure firewall rules to limit access to printer IP on ports 80/443 to authorized users only

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach printer management interfaces
  • Monitor printer logs for unusual eSCL URL requests and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check printer firmware version via web interface: Settings > About > Firmware Version. If version is earlier than 2023.10.17, printer is vulnerable.

Check Version:

curl -s http://printer-ip/hp/device/info_configuration.html | grep -i firmware

Verify Fix Applied:

Confirm firmware version is 2023.10.17 or later in printer web interface Settings > About section.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed eSCL URL requests
  • Printer web service restart events
  • Unusual GET requests to eSCL endpoints

Network Indicators:

  • Unusual traffic patterns to printer port 80/443 with eSCL URLs
  • Multiple rapid GET requests to printer

SIEM Query:

source="printer_logs" AND (url="*eSCL*" OR event="service_restart")

🔗 References

📤 Share & Export