Skip to main content

CVE-2025-43018: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in HP, Inc. Certain HP LaserJet Pro Printers

Medium
VulnerabilityCVE-2025-43018cvecve-2025-43018cwe-200
Published: Wed Jul 30 2025 (07/30/2025, 14:31:18 UTC)
Source: CVE Database V5
Vendor/Project: HP, Inc.
Product: Certain HP LaserJet Pro Printers

Description

Certain HP LaserJet Pro printers may be vulnerable to information disclosure when a non-authenticated user queries a device’s local address book.

AI-Powered Analysis

AILast updated: 07/30/2025, 15:03:08 UTC

Technical Analysis

CVE-2025-43018 is a medium-severity vulnerability affecting certain HP LaserJet Pro printers. The vulnerability arises from an information disclosure flaw (CWE-200) where a non-authenticated attacker can query the printer's local address book and retrieve sensitive information without any authentication or user interaction. This means that anyone with network access to the affected printer can potentially extract contact details stored locally on the device. The CVSS 4.0 base score is 6.9, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and limited confidentiality impact (VC:L). There is no impact on integrity or availability. The vulnerability does not require authentication or user interaction, making it easier to exploit in environments where the printer is accessible on the network. The affected versions are not explicitly listed here but are referenced in HP's security bulletin. No known exploits are currently reported in the wild, and no patches or mitigation links are provided in this data, indicating that organizations should monitor HP advisories closely for updates. The vulnerability is specific to the local address book feature of the printer, which is likely used to facilitate printing workflows by storing frequently used contacts or fax numbers.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality. The exposure of the local address book could leak sensitive contact information, including names, phone numbers, fax numbers, and possibly email addresses. This could facilitate social engineering, spear-phishing, or targeted attacks against employees or business partners. Organizations with printers accessible on shared or public networks are particularly at risk. While the vulnerability does not directly affect system integrity or availability, the leaked information could be leveraged in broader attack campaigns. In sectors such as government, finance, healthcare, and critical infrastructure, where confidentiality of contact information is paramount, this vulnerability could undermine trust and compliance with data protection regulations like GDPR. Additionally, the ease of exploitation without authentication increases the threat surface, especially in environments where network segmentation or printer access controls are weak or absent.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately review network architecture to ensure that HP LaserJet Pro printers are not exposed to untrusted networks, including the internet or guest Wi-Fi segments. 2) Restrict access to printer management interfaces and services to authorized personnel only, using network segmentation and firewall rules. 3) Disable or restrict the local address book feature if it is not essential for business operations. 4) Monitor HP's official security bulletins and apply firmware updates or patches as soon as they become available. 5) Implement network-level authentication or access controls where possible to prevent unauthorized querying of printer data. 6) Conduct regular audits of printer configurations and logs to detect any unusual access patterns. 7) Educate staff about the risks of information leakage through peripheral devices and encourage reporting of suspicious activity. These steps go beyond generic advice by focusing on network isolation, feature restriction, and proactive monitoring tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hp
Date Reserved
2025-04-16T13:49:21.688Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 688a3097ad5a09ad00a852af

Added to database: 7/30/2025, 2:47:51 PM

Last enriched: 7/30/2025, 3:03:08 PM

Last updated: 7/31/2025, 4:32:32 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats