CVE-2026-1997: CWE-346 in HP Inc HP OfficeJet Pro 8730 All-in-One Printer
Certain HP OfficeJet Pro printers may expose information if Cross‑Origin Resource Sharing (CORS) is misconfigured, potentially allowing unauthorized web origins to access device resource. CORS is disabled by default on Pro‑class devices and can only be enabled by an administrator through the Embedded Web Server (EWS). Keeping CORS disabled unless explicitly required helps ensure that only trusted solutions can interact with the device.
AI Analysis
Technical Summary
CVE-2026-1997 identifies a vulnerability categorized under CWE-346 (Origin Validation Error) in the HP OfficeJet Pro 8730 All-in-One Printer. The issue arises from a misconfiguration of Cross-Origin Resource Sharing (CORS) settings within the printer's Embedded Web Server (EWS). CORS is a security feature implemented in web browsers to control how resources are shared between different origins. In this context, if CORS is enabled improperly on the printer, it may allow unauthorized web origins to access device resources that should be restricted. This could lead to information disclosure, as unauthorized websites could retrieve sensitive data from the printer without authentication. By default, HP disables CORS on Pro-class devices, and enabling it requires administrative action through the EWS interface. The vulnerability does not require user interaction, authentication, or elevated privileges to exploit, and it is remotely exploitable over the network. The CVSS v4.0 score of 6.9 reflects a medium severity, primarily due to the potential for information exposure without direct impact on device integrity or availability. No public exploits or patches are currently known, emphasizing the importance of preventive configuration management. The vulnerability highlights the risks associated with improper origin validation and the need for strict access controls on networked devices with web interfaces.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information stored or processed by the affected printers. This may include configuration details, print job data, or network information that could be leveraged for further attacks. The impact is particularly relevant for organizations with strict data privacy requirements under regulations such as GDPR, where unauthorized data exposure could result in compliance violations and reputational damage. Additionally, attackers gaining insights into device configurations might use this information to facilitate lateral movement within corporate networks. Although the vulnerability does not directly allow code execution or denial of service, the information leakage could be a stepping stone for more sophisticated attacks. Organizations relying heavily on HP OfficeJet Pro 8730 printers in critical environments such as government, finance, healthcare, or manufacturing sectors are at higher risk. The ease of exploitation without authentication increases the threat level, especially if CORS is enabled inadvertently or without proper restrictions. Network segmentation and monitoring are crucial to limit exposure. The absence of known exploits suggests a window of opportunity for defenders to remediate before active attacks emerge.
Mitigation Recommendations
1. Ensure that CORS remains disabled on all HP OfficeJet Pro 8730 printers unless explicitly required for trusted applications. 2. If CORS must be enabled, restrict allowed origins to a minimal set of trusted domains using the Embedded Web Server configuration. 3. Regularly audit printer configurations to detect unauthorized changes to CORS settings or other security parameters. 4. Implement network segmentation to isolate printers from sensitive network segments, limiting access to the EWS interface to authorized personnel only. 5. Monitor network traffic for unusual access patterns to printer web interfaces, which may indicate exploitation attempts. 6. Stay informed about HP firmware updates and apply patches promptly once available to address this or related vulnerabilities. 7. Educate IT and security teams about the risks of enabling web interface features like CORS without proper validation. 8. Employ strong authentication and access controls on management interfaces to prevent unauthorized administrative changes. 9. Consider disabling or restricting web management interfaces if not required for daily operations. 10. Integrate printer security into broader organizational vulnerability management and incident response processes.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2026-1997: CWE-346 in HP Inc HP OfficeJet Pro 8730 All-in-One Printer
Description
Certain HP OfficeJet Pro printers may expose information if Cross‑Origin Resource Sharing (CORS) is misconfigured, potentially allowing unauthorized web origins to access device resource. CORS is disabled by default on Pro‑class devices and can only be enabled by an administrator through the Embedded Web Server (EWS). Keeping CORS disabled unless explicitly required helps ensure that only trusted solutions can interact with the device.
AI-Powered Analysis
Technical Analysis
CVE-2026-1997 identifies a vulnerability categorized under CWE-346 (Origin Validation Error) in the HP OfficeJet Pro 8730 All-in-One Printer. The issue arises from a misconfiguration of Cross-Origin Resource Sharing (CORS) settings within the printer's Embedded Web Server (EWS). CORS is a security feature implemented in web browsers to control how resources are shared between different origins. In this context, if CORS is enabled improperly on the printer, it may allow unauthorized web origins to access device resources that should be restricted. This could lead to information disclosure, as unauthorized websites could retrieve sensitive data from the printer without authentication. By default, HP disables CORS on Pro-class devices, and enabling it requires administrative action through the EWS interface. The vulnerability does not require user interaction, authentication, or elevated privileges to exploit, and it is remotely exploitable over the network. The CVSS v4.0 score of 6.9 reflects a medium severity, primarily due to the potential for information exposure without direct impact on device integrity or availability. No public exploits or patches are currently known, emphasizing the importance of preventive configuration management. The vulnerability highlights the risks associated with improper origin validation and the need for strict access controls on networked devices with web interfaces.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information stored or processed by the affected printers. This may include configuration details, print job data, or network information that could be leveraged for further attacks. The impact is particularly relevant for organizations with strict data privacy requirements under regulations such as GDPR, where unauthorized data exposure could result in compliance violations and reputational damage. Additionally, attackers gaining insights into device configurations might use this information to facilitate lateral movement within corporate networks. Although the vulnerability does not directly allow code execution or denial of service, the information leakage could be a stepping stone for more sophisticated attacks. Organizations relying heavily on HP OfficeJet Pro 8730 printers in critical environments such as government, finance, healthcare, or manufacturing sectors are at higher risk. The ease of exploitation without authentication increases the threat level, especially if CORS is enabled inadvertently or without proper restrictions. Network segmentation and monitoring are crucial to limit exposure. The absence of known exploits suggests a window of opportunity for defenders to remediate before active attacks emerge.
Mitigation Recommendations
1. Ensure that CORS remains disabled on all HP OfficeJet Pro 8730 printers unless explicitly required for trusted applications. 2. If CORS must be enabled, restrict allowed origins to a minimal set of trusted domains using the Embedded Web Server configuration. 3. Regularly audit printer configurations to detect unauthorized changes to CORS settings or other security parameters. 4. Implement network segmentation to isolate printers from sensitive network segments, limiting access to the EWS interface to authorized personnel only. 5. Monitor network traffic for unusual access patterns to printer web interfaces, which may indicate exploitation attempts. 6. Stay informed about HP firmware updates and apply patches promptly once available to address this or related vulnerabilities. 7. Educate IT and security teams about the risks of enabling web interface features like CORS without proper validation. 8. Employ strong authentication and access controls on management interfaces to prevent unauthorized administrative changes. 9. Consider disabling or restricting web management interfaces if not required for daily operations. 10. Integrate printer security into broader organizational vulnerability management and incident response processes.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hp
- Date Reserved
- 2026-02-05T16:51:16.104Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698b75fd4b57a58fa1209f97
Added to database: 2/10/2026, 6:16:29 PM
Last enriched: 2/10/2026, 7:31:37 PM
Last updated: 2/21/2026, 12:22:19 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.