Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12785: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in HP Inc HP Color LaserJet MFP M478-M479 series

0
Medium
VulnerabilityCVE-2025-12785cvecve-2025-12785cwe-200
Published: Thu Nov 13 2025 (11/13/2025, 17:38:09 UTC)
Source: CVE Database V5
Vendor/Project: HP Inc
Product: HP Color LaserJet MFP M478-M479 series

Description

Certain HP LaserJet Pro printers may be vulnerable to information disclosure leading to credential exposure by altering the scan/send destination address and/or modifying the LDAP Server.

AI-Powered Analysis

AILast updated: 11/13/2025, 17:52:09 UTC

Technical Analysis

CVE-2025-12785 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) impacting HP Color LaserJet MFP M478-M479 series printers. The flaw arises from the ability to alter the scan/send destination address and modify the LDAP server configuration on the device. This misconfiguration or exploitation can lead to unauthorized disclosure of sensitive information, including credentials used for LDAP authentication or other network services integrated with the printer. The vulnerability requires an attacker to have high privileges (PR:H) on the device, meaning they must already have administrative or equivalent access to the printer to exploit it. No user interaction is necessary, and the attack vector is network-based (AV:N), making remote exploitation feasible if privileged access is obtained. The CVSS 4.0 base score is 6.9, reflecting a medium severity level primarily due to the requirement for high privileges and the impact on confidentiality (VC:H). The vulnerability does not affect integrity or availability directly and does not require user interaction. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation currently relies on access control and configuration management. The vulnerability could be leveraged by attackers who have already compromised internal networks or administrative accounts to escalate their access or harvest credentials for further lateral movement.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive credential exposure within internal networks, potentially enabling attackers to move laterally or escalate privileges. Organizations with large deployments of HP Color LaserJet MFP M478-M479 series printers, especially in sectors such as government, finance, healthcare, and critical infrastructure, could see increased risk due to the sensitive nature of information handled and the integration of printers with LDAP for authentication and directory services. Exposure of LDAP credentials could compromise user authentication systems, leading to broader network access. The impact is primarily on confidentiality, with no direct effect on system availability or integrity. However, the indirect consequences of credential theft could be severe, including data breaches and unauthorized access to sensitive systems. Since exploitation requires high privileges, the threat is more relevant in scenarios where internal security controls are weak or where administrative credentials have been compromised. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.

Mitigation Recommendations

1. Restrict administrative access to HP Color LaserJet MFP M478-M479 printers using strong authentication methods and network segmentation to limit exposure. 2. Monitor and audit changes to scan/send destination addresses and LDAP server configurations to detect unauthorized modifications promptly. 3. Implement strict access controls on LDAP servers and ensure that printer accounts have minimal necessary privileges. 4. Regularly review and update printer firmware and software; apply vendor patches as soon as they become available. 5. Employ network-level protections such as firewalls and intrusion detection systems to monitor printer traffic and detect anomalous behavior. 6. Educate IT staff on secure printer configuration and the risks associated with administrative credential exposure. 7. Consider isolating printer management interfaces from general user networks to reduce attack surface. 8. Use encrypted communication channels (e.g., LDAPS) between printers and LDAP servers to protect credentials in transit.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
hp
Date Reserved
2025-11-05T22:37:08.149Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69161915cdc01d12641ad2eb

Added to database: 11/13/2025, 5:44:53 PM

Last enriched: 11/13/2025, 5:52:09 PM

Last updated: 11/14/2025, 6:17:02 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats