Those who own an HP printer should be careful. The company has announced that around 250 of the manufacturer’s models are affected by a critical security vulnerability that may allow attackers remote access and cause damage through a buffer overflow. Affected users should update their printers’ firmware as soon as possible.
HP printer affected by critical vulnerability
Using the Link-Local Multicast Name Resolution (LLMNR) protocol, a buffer overflow can be triggered in around 250 printers from HP, while at the same time malicious code can be smuggled in via remote code execution.
HP informs on its own homepage about the critical vulnerability with a CVSS rating of 8.4, which was first discovered on March 21. Nearly 250 models from the manufacturer’s Enterprise, Deskjet, OfficeJet, PageWide or DesignJet series are affected. The complete list of all affected models can be viewed directly on the manufacturer’s homepage.
The solution is to update the firmware of the corresponding printer. HP has specifically provided a firmware update of all potentially compromised models for this purpose, which can be downloaded from the Software and Driver Downloads section.
On certain models of HP Enterprise and HP LaserJet Pro printers, the problem can also be worked around by disabling LLMNR in the network settings.
Other issues with 21 models
Twenty-one other HP printers in the LaserjetPro, PageWide and Officejet model lines are also affected by another critical vulnerability, the vendor disclosed in an additional advisory.
With corresponding products, attackers could disclose information, paralyze the devices (denial of service) and also execute a buffer overflow. With a CVSS rating of 9.8, two of the three vulnerabilities reach an extremely critical value. An update of the firmware should also help to cope with these problems. Corresponding updates are also available for download in the download area on the manufacturer’s homepage.