CVE-2025-43025

7.5 HIGH

📋 TL;DR

A buffer overflow vulnerability in HP Universal Print Driver versions 7.4 and older could allow attackers to cause denial of service by crashing the print service. This affects organizations using HP printers with vulnerable UPD versions installed on Windows systems.

💻 Affected Systems

Products:
  • HP Universal Print Driver
Versions: Versions 7.4 and older (including 7.3.x, 7.2.x, 7.1.x, etc.)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both client installations and print servers using the vulnerable UPD versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of printing services across the organization, potentially requiring system reboots or driver reinstallation to restore functionality.

🟠

Likely Case

Localized printing service crashes affecting specific workstations or print servers, causing temporary printing outages.

🟢

If Mitigated

Minimal impact with proper network segmentation and limited user access to print driver configuration.

🌐 Internet-Facing: LOW - Print drivers typically operate internally and aren't directly exposed to the internet.
🏢 Internal Only: MEDIUM - Internal users or compromised accounts could exploit this to disrupt printing operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation likely requires some level of access to trigger the buffer overflow through print job manipulation or driver configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: HP UPD version 7.5 or newer

Vendor Advisory: https://support.hp.com/us-en/document/ish_12690576-12690598-16/hpsbpi04032

Restart Required: Yes

Instructions:

1. Download HP UPD version 7.5 or newer from HP support site. 2. Uninstall current UPD version. 3. Install updated UPD version. 4. Restart affected systems. 5. Update printer configurations to use new driver.

🔧 Temporary Workarounds

Restrict Print Driver Installation

windows

Limit who can install or modify print drivers to prevent exploitation

Group Policy: Computer Configuration > Policies > Administrative Templates > Printers > 'Allow Print Spooler to accept client connections' = Disabled

Network Segmentation

all

Isolate print servers and vulnerable clients from general network access

🧯 If You Can't Patch

  • Implement strict access controls to limit who can submit print jobs or modify printer configurations
  • Monitor print server logs for unusual activity or repeated service crashes

🔍 How to Verify

Check if Vulnerable:

Check HP UPD version in Control Panel > Devices and Printers > Right-click printer > Printer Properties > Advanced tab

Check Version:

wmic printer get DriverName,Name | findstr /i "HP Universal"

Verify Fix Applied:

Confirm UPD version is 7.5 or newer using same method, and verify printing functionality works normally

📡 Detection & Monitoring

Log Indicators:

  • Print spooler service crashes (Event ID 7031, 7034)
  • Unexpected print job failures
  • Multiple print job submissions from single user

Network Indicators:

  • Unusual SMB traffic to print servers
  • Multiple RPC connections to spooler service

SIEM Query:

source="windows" AND (event_id=7031 OR event_id=7034) AND process_name="spoolsv.exe"

🔗 References

📤 Share & Export