CVE-2024-5749

7.5 HIGH

📋 TL;DR

This vulnerability in certain HP DesignJet printers allows attackers to view SMTP server credentials through credential reflection. Attackers could potentially intercept or steal email server authentication details. Organizations using affected HP DesignJet printers with SMTP configuration are at risk.

💻 Affected Systems

Products:
  • HP DesignJet T650, T650 36-in, T650 42-in, T650 44-in, T650 60-in, T650 24-in, T650 24-in Printer, T650 36-in Printer, T650 42-in Printer, T650 44-in Printer, T650 60-in Printer
Versions: Firmware versions prior to 4.7.0.1
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects printers with SMTP server configuration enabled. Printers without SMTP configuration are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain SMTP server credentials, enabling email spoofing, phishing campaigns, or unauthorized email sending from the organization's infrastructure.

🟠

Likely Case

Internal attackers or those with network access capture SMTP credentials, potentially using them for spam campaigns or credential reuse attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to potential credential exposure without ability to use them externally.

🌐 Internet-Facing: MEDIUM - Printers exposed to internet could allow remote credential harvesting if vulnerable endpoints are accessible.
🏢 Internal Only: HIGH - Internal attackers or compromised devices could easily harvest credentials from vulnerable printers on the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Credential reflection typically involves simple HTTP requests to vulnerable endpoints that return credentials in responses.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version 4.7.0.1 or later

Vendor Advisory: https://support.hp.com/us-en/document/ish_11428772-11428805-16/hpsbpi03979

Restart Required: Yes

Instructions:

1. Download firmware 4.7.0.1 or later from HP support site. 2. Upload firmware to printer via web interface or USB. 3. Install firmware update. 4. Reboot printer after installation completes.

🔧 Temporary Workarounds

Disable SMTP Configuration

all

Remove or disable SMTP server configuration on affected printers

Access printer web interface > Settings > Network > Email > Disable SMTP configuration

Network Segmentation

all

Isolate printers to separate VLAN with restricted access

🧯 If You Can't Patch

  • Disable SMTP functionality on all affected printers
  • Implement strict network access controls to limit who can communicate with printer management interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version in printer web interface: Settings > System > About. If version is below 4.7.0.1 and SMTP is configured, system is vulnerable.

Check Version:

curl -s http://printer-ip/hp/device/this.LCDispatcher | grep -i firmware

Verify Fix Applied:

Confirm firmware version is 4.7.0.1 or later in printer web interface and verify SMTP credentials are no longer exposed in HTTP responses.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to printer management interfaces
  • Multiple failed authentication attempts to printer web interface

Network Indicators:

  • HTTP traffic to printer endpoints that typically return credential data
  • Unusual outbound SMTP traffic from printer network segment

SIEM Query:

source="printer_logs" AND (uri="*smtp*" OR uri="*credential*" OR uri="*password*")

🔗 References

📤 Share & Export