CVE-2025-12784: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in HP Inc HP Color LaserJet MFP M478-M479 series
Certain HP LaserJet Pro printers may be vulnerable to information disclosure leading to credential exposure by altering the scan/send destination address and/or modifying the LDAP Server.
AI Analysis
Technical Summary
CVE-2025-12784 is a vulnerability classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. It affects the HP Color LaserJet MFP M478-M479 series printers. The root cause lies in the device's handling of scan/send destination addresses and LDAP server configurations, which can be altered to disclose sensitive information, including credentials. An attacker with high privileges on the device can manipulate these settings to redirect scanned documents or query LDAP servers in a way that leaks confidential data. The CVSS 4.0 base score is 6.9 (medium severity), with an attack vector of network, low attack complexity, no privileges required for attack initiation, no user interaction, but requiring high privileges (PR:H), and high impact on confidentiality (VC:H). The vulnerability does not affect integrity or availability. No patches or known exploits are currently available. The vulnerability's exploitation requires administrative or equivalent access to the printer, which limits the attack surface but still poses a risk in environments where such access might be compromised or insufficiently controlled. The exposure of credentials could facilitate further attacks within an organization's network, such as lateral movement or privilege escalation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information, including credentials stored or transmitted via the affected printers. This could compromise internal authentication systems, especially if LDAP credentials are exposed, enabling attackers to access broader network resources. Organizations in sectors like government, finance, healthcare, and critical infrastructure, which rely heavily on secure document handling and directory services, are at higher risk. The impact includes potential data breaches, loss of confidentiality, and increased risk of subsequent attacks leveraging stolen credentials. Given the widespread use of HP printers in Europe, particularly in large enterprises and public sector entities, the vulnerability could affect a significant number of devices. However, the requirement for high privileges to exploit the flaw reduces the likelihood of widespread exploitation without prior compromise. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
1. Restrict administrative access to HP Color LaserJet MFP M478-M479 series printers to trusted personnel only, using strong authentication mechanisms. 2. Regularly audit and monitor printer configurations, especially scan/send destination addresses and LDAP server settings, for unauthorized changes. 3. Implement network segmentation to isolate printers from critical directory services and sensitive data repositories. 4. Employ strong access controls and logging on LDAP servers to detect anomalous queries or access patterns originating from printers. 5. Disable unnecessary services or features on the printers that are not required for business operations to reduce attack surface. 6. Stay informed about vendor updates and apply patches promptly once HP releases fixes for this vulnerability. 7. Consider using network-level protections such as firewalls or access control lists to limit printer communication to authorized systems only. 8. Train IT and security staff to recognize signs of printer compromise and respond accordingly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-12784: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in HP Inc HP Color LaserJet MFP M478-M479 series
Description
Certain HP LaserJet Pro printers may be vulnerable to information disclosure leading to credential exposure by altering the scan/send destination address and/or modifying the LDAP Server.
AI-Powered Analysis
Technical Analysis
CVE-2025-12784 is a vulnerability classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. It affects the HP Color LaserJet MFP M478-M479 series printers. The root cause lies in the device's handling of scan/send destination addresses and LDAP server configurations, which can be altered to disclose sensitive information, including credentials. An attacker with high privileges on the device can manipulate these settings to redirect scanned documents or query LDAP servers in a way that leaks confidential data. The CVSS 4.0 base score is 6.9 (medium severity), with an attack vector of network, low attack complexity, no privileges required for attack initiation, no user interaction, but requiring high privileges (PR:H), and high impact on confidentiality (VC:H). The vulnerability does not affect integrity or availability. No patches or known exploits are currently available. The vulnerability's exploitation requires administrative or equivalent access to the printer, which limits the attack surface but still poses a risk in environments where such access might be compromised or insufficiently controlled. The exposure of credentials could facilitate further attacks within an organization's network, such as lateral movement or privilege escalation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information, including credentials stored or transmitted via the affected printers. This could compromise internal authentication systems, especially if LDAP credentials are exposed, enabling attackers to access broader network resources. Organizations in sectors like government, finance, healthcare, and critical infrastructure, which rely heavily on secure document handling and directory services, are at higher risk. The impact includes potential data breaches, loss of confidentiality, and increased risk of subsequent attacks leveraging stolen credentials. Given the widespread use of HP printers in Europe, particularly in large enterprises and public sector entities, the vulnerability could affect a significant number of devices. However, the requirement for high privileges to exploit the flaw reduces the likelihood of widespread exploitation without prior compromise. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
1. Restrict administrative access to HP Color LaserJet MFP M478-M479 series printers to trusted personnel only, using strong authentication mechanisms. 2. Regularly audit and monitor printer configurations, especially scan/send destination addresses and LDAP server settings, for unauthorized changes. 3. Implement network segmentation to isolate printers from critical directory services and sensitive data repositories. 4. Employ strong access controls and logging on LDAP servers to detect anomalous queries or access patterns originating from printers. 5. Disable unnecessary services or features on the printers that are not required for business operations to reduce attack surface. 6. Stay informed about vendor updates and apply patches promptly once HP releases fixes for this vulnerability. 7. Consider using network-level protections such as firewalls or access control lists to limit printer communication to authorized systems only. 8. Train IT and security staff to recognize signs of printer compromise and respond accordingly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hp
- Date Reserved
- 2025-11-05T22:37:06.808Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69161915cdc01d12641ad2e8
Added to database: 11/13/2025, 5:44:53 PM
Last enriched: 11/13/2025, 5:51:56 PM
Last updated: 11/14/2025, 4:07:37 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13161: CWE-23 Relative Path Traversal in IQ Service International IQ-Support
HighCVE-2025-13160: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IQ Service International IQ-Support
MediumCVE-2025-9479: Out of bounds read in Google Chrome
UnknownCVE-2025-13107: Inappropriate implementation in Google Chrome
UnknownCVE-2025-13102: Inappropriate implementation in Google Chrome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.