Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2832: CWE-200 in HP Inc Samsung MultiXpress SL-X7600LXR, SL-X7500LXR, SL-X7400LXR

0
Medium
VulnerabilityCVE-2026-2832cvecve-2026-2832cwe-200
Published: Fri Feb 20 2026 (02/20/2026, 17:21:02 UTC)
Source: CVE Database V5
Vendor/Project: HP Inc
Product: Samsung MultiXpress SL-X7600LXR, SL-X7500LXR, SL-X7400LXR

Description

Certain Samsung MultiXpress Multifunction Printers may be vulnerable to information disclosure, potentially exposing address book entries and other device configuration information through specific APIs without proper authorization.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:28:58 UTC

Technical Analysis

CVE-2026-2832 is a medium severity information disclosure vulnerability (CWE-200) identified in HP Inc's Samsung MultiXpress multifunction printers, specifically models SL-X7600LXR, SL-X7500LXR, and SL-X7400LXR. The vulnerability arises from insufficient authorization checks in certain device APIs that expose sensitive information such as address book entries and device configuration details. An attacker with network access can query these APIs without authentication or user interaction, thereby retrieving confidential data. The CVSS 4.0 vector (AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) indicates that the attack requires adjacent network access (e.g., same LAN), has low attack complexity, and no privileges or user interaction are needed. The impact is limited to confidentiality, with no direct effect on integrity or availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and assigned a CVE ID. This flaw could be leveraged by attackers to gather internal contact information and device settings, potentially aiding in further targeted attacks or social engineering. The lack of authentication enforcement on sensitive API endpoints represents a significant security oversight in these printer models.

Potential Impact

The primary impact of CVE-2026-2832 is unauthorized disclosure of sensitive information stored on affected Samsung MultiXpress printers, including address book entries and device configuration data. This exposure can lead to privacy violations, leakage of internal organizational contacts, and potential reconnaissance for subsequent attacks such as phishing or network intrusion. While the vulnerability does not allow direct control over the device or disruption of services, the confidentiality breach can undermine trust and compliance with data protection regulations. Organizations with these printers on internal or adjacent networks are at risk, especially if network segmentation is weak or if printers are accessible from less secure zones. Attackers could use the disclosed information to map internal infrastructure or identify high-value targets. The absence of authentication requirements lowers the barrier to exploitation, increasing the likelihood of unauthorized data access. However, the requirement for adjacent network access limits remote exploitation from the internet unless the printer is exposed externally.

Mitigation Recommendations

To mitigate CVE-2026-2832, organizations should implement the following specific measures: 1) Restrict network access to the affected printers by placing them on isolated VLANs or network segments accessible only to authorized personnel and management systems. 2) Disable or restrict access to printer management APIs from untrusted networks or devices. 3) Monitor network traffic for unusual API requests or data exfiltration attempts targeting the printers. 4) Enforce strong network access controls and firewall rules to prevent unauthorized lateral movement to printer devices. 5) Regularly audit printer configurations to ensure no unnecessary services or APIs are exposed. 6) Engage with HP Inc to obtain and apply security patches or firmware updates as soon as they become available. 7) Educate IT staff about this vulnerability to ensure timely detection and response. 8) Consider replacing or upgrading affected printer models if they cannot be adequately secured. These steps go beyond generic advice by focusing on network segmentation, access control, and proactive monitoring tailored to the specific nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hp
Date Reserved
2026-02-19T20:59:41.408Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69989d822c4d84f260b8d827

Added to database: 2/20/2026, 5:44:34 PM

Last enriched: 2/28/2026, 2:28:58 PM

Last updated: 4/6/2026, 6:52:05 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses