Skip to main content

CVE-2022-28721: Remote Code Execution in Certain HP inkjet printers, HP LaserJet Pro printers, HP PageWide Pro printers.

Critical
VulnerabilityCVE-2022-28721cvecve-2022-28721
Published: Mon Sep 26 2022 (09/26/2022, 14:54:08 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: Certain HP inkjet printers, HP LaserJet Pro printers, HP PageWide Pro printers.

Description

Certain HP Print Products are potentially vulnerable to Remote Code Execution.

AI-Powered Analysis

AILast updated: 07/06/2025, 02:11:29 UTC

Technical Analysis

CVE-2022-28721 is a critical remote code execution (RCE) vulnerability affecting multiple models of HP printers, including certain HP inkjet printers, HP LaserJet Pro printers, and HP PageWide Pro printers. The vulnerability allows an unauthenticated attacker to execute arbitrary code remotely without requiring user interaction. The CVSS v3.1 base score is 9.8, indicating a critical severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker could fully compromise the affected device. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the ease of attack and the critical impact. The vulnerability likely stems from flaws in the printer firmware or network services that handle print jobs or management protocols, allowing maliciously crafted network packets or print jobs to trigger code execution. This could enable attackers to take control of the printer, manipulate print jobs, intercept sensitive data, or use the printer as a foothold to pivot into the broader network environment. The affected HP printer models are widely used in enterprise and office environments, making this vulnerability a serious threat to organizations relying on these devices for daily operations.

Potential Impact

For European organizations, this vulnerability poses a substantial risk. Printers are often connected to corporate networks and may not be as rigorously secured or monitored as other IT assets, making them attractive targets for attackers. Successful exploitation could lead to full compromise of the printer, enabling attackers to intercept confidential documents, disrupt printing services, or use the printer as a launchpad for lateral movement within the network. This could result in data breaches, operational disruptions, and potential compliance violations under regulations such as GDPR. Additionally, the critical nature of the vulnerability and the lack of required authentication or user interaction increase the likelihood of exploitation, especially in environments where printers are accessible over the network or exposed to the internet. The impact extends beyond the printer itself, as compromised printers can serve as entry points for more extensive attacks on corporate infrastructure.

Mitigation Recommendations

Organizations should immediately identify and inventory all affected HP printer models within their environment. They should check HP's official security advisories and firmware update portals for patches addressing CVE-2022-28721 and apply these updates promptly. If patches are not yet available, organizations should implement network segmentation to isolate printers from critical network segments and restrict access to printer management interfaces to trusted administrators only. Employing network-level controls such as firewall rules to block unauthorized access to printer ports and services is essential. Monitoring network traffic for unusual activity related to printers can help detect exploitation attempts. Additionally, disabling unnecessary printer services and protocols reduces the attack surface. Organizations should also review and tighten printer configuration settings, including access controls and authentication mechanisms. Regularly auditing printer firmware versions and configurations will help maintain security posture. Finally, raising user awareness about the risks associated with networked printers and encouraging reporting of suspicious printer behavior can aid early detection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hp
Date Reserved
2022-04-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68361cec182aa0cae2232234

Added to database: 5/27/2025, 8:13:32 PM

Last enriched: 7/6/2025, 2:11:29 AM

Last updated: 7/26/2025, 6:05:22 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats