Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12784: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in HP Inc HP Color LaserJet MFP M478-M479 series

0
Medium
VulnerabilityCVE-2025-12784cvecve-2025-12784cwe-200
Published: Thu Nov 13 2025 (11/13/2025, 17:35:09 UTC)
Source: CVE Database V5
Vendor/Project: HP Inc
Product: HP Color LaserJet MFP M478-M479 series

Description

Certain HP LaserJet Pro printers may be vulnerable to information disclosure leading to credential exposure by altering the scan/send destination address and/or modifying the LDAP Server.

AI-Powered Analysis

AILast updated: 11/13/2025, 17:51:56 UTC

Technical Analysis

CVE-2025-12784 is a vulnerability classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. It affects the HP Color LaserJet MFP M478-M479 series printers. The root cause lies in the device's handling of scan/send destination addresses and LDAP server configurations, which can be altered to disclose sensitive information, including credentials. An attacker with high privileges on the device can manipulate these settings to redirect scanned documents or query LDAP servers in a way that leaks confidential data. The CVSS 4.0 base score is 6.9 (medium severity), with an attack vector of network, low attack complexity, no privileges required for attack initiation, no user interaction, but requiring high privileges (PR:H), and high impact on confidentiality (VC:H). The vulnerability does not affect integrity or availability. No patches or known exploits are currently available. The vulnerability's exploitation requires administrative or equivalent access to the printer, which limits the attack surface but still poses a risk in environments where such access might be compromised or insufficiently controlled. The exposure of credentials could facilitate further attacks within an organization's network, such as lateral movement or privilege escalation.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information, including credentials stored or transmitted via the affected printers. This could compromise internal authentication systems, especially if LDAP credentials are exposed, enabling attackers to access broader network resources. Organizations in sectors like government, finance, healthcare, and critical infrastructure, which rely heavily on secure document handling and directory services, are at higher risk. The impact includes potential data breaches, loss of confidentiality, and increased risk of subsequent attacks leveraging stolen credentials. Given the widespread use of HP printers in Europe, particularly in large enterprises and public sector entities, the vulnerability could affect a significant number of devices. However, the requirement for high privileges to exploit the flaw reduces the likelihood of widespread exploitation without prior compromise. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.

Mitigation Recommendations

1. Restrict administrative access to HP Color LaserJet MFP M478-M479 series printers to trusted personnel only, using strong authentication mechanisms. 2. Regularly audit and monitor printer configurations, especially scan/send destination addresses and LDAP server settings, for unauthorized changes. 3. Implement network segmentation to isolate printers from critical directory services and sensitive data repositories. 4. Employ strong access controls and logging on LDAP servers to detect anomalous queries or access patterns originating from printers. 5. Disable unnecessary services or features on the printers that are not required for business operations to reduce attack surface. 6. Stay informed about vendor updates and apply patches promptly once HP releases fixes for this vulnerability. 7. Consider using network-level protections such as firewalls or access control lists to limit printer communication to authorized systems only. 8. Train IT and security staff to recognize signs of printer compromise and respond accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
hp
Date Reserved
2025-11-05T22:37:06.808Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69161915cdc01d12641ad2e8

Added to database: 11/13/2025, 5:44:53 PM

Last enriched: 11/13/2025, 5:51:56 PM

Last updated: 11/14/2025, 4:07:37 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats