Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1997: CWE-346 in HP Inc HP OfficeJet Pro 8730 All-in-One Printer

0
Medium
VulnerabilityCVE-2026-1997cvecve-2026-1997cwe-346
Published: Tue Feb 10 2026 (02/10/2026, 17:54:46 UTC)
Source: CVE Database V5
Vendor/Project: HP Inc
Product: HP OfficeJet Pro 8730 All-in-One Printer

Description

Certain HP OfficeJet Pro printers may expose information if Cross‑Origin Resource Sharing (CORS) is misconfigured, potentially allowing unauthorized web origins to access device resource. CORS is disabled by default on Pro‑class devices and can only be enabled by an administrator through the Embedded Web Server (EWS). Keeping CORS disabled unless explicitly required helps ensure that only trusted solutions can interact with the device.

AI-Powered Analysis

AILast updated: 02/10/2026, 19:31:37 UTC

Technical Analysis

CVE-2026-1997 identifies a vulnerability categorized under CWE-346 (Origin Validation Error) in the HP OfficeJet Pro 8730 All-in-One Printer. The issue arises from a misconfiguration of Cross-Origin Resource Sharing (CORS) settings within the printer's Embedded Web Server (EWS). CORS is a security feature implemented in web browsers to control how resources are shared between different origins. In this context, if CORS is enabled improperly on the printer, it may allow unauthorized web origins to access device resources that should be restricted. This could lead to information disclosure, as unauthorized websites could retrieve sensitive data from the printer without authentication. By default, HP disables CORS on Pro-class devices, and enabling it requires administrative action through the EWS interface. The vulnerability does not require user interaction, authentication, or elevated privileges to exploit, and it is remotely exploitable over the network. The CVSS v4.0 score of 6.9 reflects a medium severity, primarily due to the potential for information exposure without direct impact on device integrity or availability. No public exploits or patches are currently known, emphasizing the importance of preventive configuration management. The vulnerability highlights the risks associated with improper origin validation and the need for strict access controls on networked devices with web interfaces.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information stored or processed by the affected printers. This may include configuration details, print job data, or network information that could be leveraged for further attacks. The impact is particularly relevant for organizations with strict data privacy requirements under regulations such as GDPR, where unauthorized data exposure could result in compliance violations and reputational damage. Additionally, attackers gaining insights into device configurations might use this information to facilitate lateral movement within corporate networks. Although the vulnerability does not directly allow code execution or denial of service, the information leakage could be a stepping stone for more sophisticated attacks. Organizations relying heavily on HP OfficeJet Pro 8730 printers in critical environments such as government, finance, healthcare, or manufacturing sectors are at higher risk. The ease of exploitation without authentication increases the threat level, especially if CORS is enabled inadvertently or without proper restrictions. Network segmentation and monitoring are crucial to limit exposure. The absence of known exploits suggests a window of opportunity for defenders to remediate before active attacks emerge.

Mitigation Recommendations

1. Ensure that CORS remains disabled on all HP OfficeJet Pro 8730 printers unless explicitly required for trusted applications. 2. If CORS must be enabled, restrict allowed origins to a minimal set of trusted domains using the Embedded Web Server configuration. 3. Regularly audit printer configurations to detect unauthorized changes to CORS settings or other security parameters. 4. Implement network segmentation to isolate printers from sensitive network segments, limiting access to the EWS interface to authorized personnel only. 5. Monitor network traffic for unusual access patterns to printer web interfaces, which may indicate exploitation attempts. 6. Stay informed about HP firmware updates and apply patches promptly once available to address this or related vulnerabilities. 7. Educate IT and security teams about the risks of enabling web interface features like CORS without proper validation. 8. Employ strong authentication and access controls on management interfaces to prevent unauthorized administrative changes. 9. Consider disabling or restricting web management interfaces if not required for daily operations. 10. Integrate printer security into broader organizational vulnerability management and incident response processes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hp
Date Reserved
2026-02-05T16:51:16.104Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b75fd4b57a58fa1209f97

Added to database: 2/10/2026, 6:16:29 PM

Last enriched: 2/10/2026, 7:31:37 PM

Last updated: 2/21/2026, 12:22:19 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats