6.9
MEDIUM CVSS 4.0
CVE-2025-12784
Certain HP LaserJet Pro Printers – Potential Information Disclosure
Description

Certain HP LaserJet Pro printers may be vulnerable to information disclosure leading to credential exposure by altering the scan/send destination address and/or modifying the LDAP Server.

INFO

Published Date :

Nov. 13, 2025, 6:15 p.m.

Last Modified :

Feb. 13, 2026, 4:38 p.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2025-12784 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Hp w1a75a_firmware
2 Hp w1a76a_firmware
3 Hp w1a77a_firmware
4 Hp w1a81a_firmware
5 Hp w1a82a_firmware
6 Hp w1a79a_firmware
7 Hp w1a80a_firmware
8 Hp w1a78a_firmware
9 Hp w1y40a_firmware
10 Hp w1y41a_firmware
11 Hp w1y46a_firmware
12 Hp w1y47a_firmware
13 Hp w1y44a_firmware
14 Hp w1y45a_firmware
15 Hp w1y43a_firmware
16 Hp w1a66a_firmware
17 Hp w1a46a_firmware
18 Hp w1a47a_firmware
19 Hp w1a48a_firmware
20 Hp w1a51a_firmware
21 Hp w1a53a_firmware
22 Hp w1a56a_firmware
23 Hp w1a63a_firmware
24 Hp w1a52a_firmware
25 Hp 93m22a_firmware
26 Hp w1a58a_firmware
27 Hp w1a59a_firmware
28 Hp w1a60a_firmware
29 Hp w1a57a_firmware
30 Hp w1a29a_firmware
31 Hp w1a32a_firmware
32 Hp w1a30a_firmware
33 Hp w1a38a_firmware
34 Hp w1a34a_firmware
35 Hp w1a35a_firmware
36 Hp w1a28a_firmware
37 Hp w1a31a_firmware
38 Hp w1a33a_firmware
39 Hp w1a75a
40 Hp w1a76a
41 Hp w1a77a
42 Hp w1a81a
43 Hp w1a82a
44 Hp w1a79a
45 Hp w1a80a
46 Hp w1a78a
47 Hp w1y40a
48 Hp w1y41a
49 Hp w1y46a
50 Hp w1y47a
51 Hp w1y44a
52 Hp w1y45a
53 Hp w1y43a
54 Hp w1a66a
55 Hp w1a46a
56 Hp w1a47a
57 Hp w1a48a
58 Hp w1a51a
59 Hp w1a53a
60 Hp w1a56a
61 Hp w1a63a
62 Hp w1a52a
63 Hp 93m22a
64 Hp w1a58a
65 Hp w1a59a
66 Hp w1a60a
67 Hp w1a57a
68 Hp w1a29a
69 Hp w1a32a
70 Hp w1a30a
71 Hp w1a38a
72 Hp w1a34a
73 Hp w1a35a
74 Hp w1a28a
75 Hp w1a31a
76 Hp w1a33a
77 Hp 7kw48a_firmware
78 Hp 7kw48a
79 Hp 7kw49a_firmware
80 Hp 7kw49a
81 Hp 7kw50a_firmware
82 Hp 7kw50a
83 Hp 7kw51a_firmware
84 Hp 7kw51a
85 Hp 7kw54a_firmware
86 Hp 7kw54a
87 Hp 7kw55a_firmware
88 Hp 7kw55a
89 Hp 7kw56a_firmware
90 Hp 7kw56a
91 Hp 7kw57a_firmware
92 Hp 7kw57a
93 Hp 7kw58a_firmware
94 Hp 7kw58a
95 Hp 7kw59a_firmware
96 Hp 7kw59a
97 Hp 7kw63a_firmware
98 Hp 7kw63a
99 Hp 7kw64a_firmware
100 Hp 7kw64a
101 Hp 7kw65a_firmware
102 Hp 7kw65a
103 Hp 7kw66a_firmware
104 Hp 7kw66a
105 Hp 7kw67a_firmware
106 Hp 7kw67a
107 Hp 7kw68a_firmware
108 Hp 7kw68a
109 Hp 7kw72a_firmware
110 Hp 7kw72a
111 Hp 7kw73a_firmware
112 Hp 7kw73a
113 Hp 7kw74a_firmware
114 Hp 7kw74a
115 Hp 7kw75a_firmware
116 Hp 7kw75a
117 Hp 7kw76a_firmware
118 Hp 7kw76a
119 Hp 7kw77a_firmware
120 Hp 7kw77a
121 Hp 7kw78a_firmware
122 Hp 7kw78a
123 Hp 7kw79a_firmware
124 Hp 7kw79a
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
CVSS 4.0 MEDIUM 74586083-13ce-40fd-b46a-8e5d23cfbcb2
CVSS 4.0 MEDIUM [email protected]
Solution
Update printer firmware and restrict network access to printer management interfaces.
  • Update printer firmware to the latest version.
  • Restrict access to printer management interfaces.
  • Disable unnecessary network protocols and services.
  • Implement network segmentation for printers.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-12784.

URL Resource
https://support.hp.com/us-en/document/ish_13229161-13229183-16/hpsbpi04074 Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-12784 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-12784 weaknesses.

CAPEC-13: Subverting Environment Variable Values Subverting Environment Variable Values CAPEC-22: Exploiting Trust in Client Exploiting Trust in Client CAPEC-59: Session Credential Falsification through Prediction Session Credential Falsification through Prediction CAPEC-60: Reusing Session IDs (aka Session Replay) Reusing Session IDs (aka Session Replay) CAPEC-79: Using Slashes in Alternate Encoding Using Slashes in Alternate Encoding CAPEC-116: Excavation Excavation CAPEC-169: Footprinting Footprinting CAPEC-224: Fingerprinting Fingerprinting CAPEC-285: ICMP Echo Request Ping ICMP Echo Request Ping CAPEC-287: TCP SYN Scan TCP SYN Scan CAPEC-290: Enumerate Mail Exchange (MX) Records Enumerate Mail Exchange (MX) Records CAPEC-291: DNS Zone Transfers DNS Zone Transfers CAPEC-292: Host Discovery Host Discovery CAPEC-293: Traceroute Route Enumeration Traceroute Route Enumeration CAPEC-294: ICMP Address Mask Request ICMP Address Mask Request CAPEC-295: Timestamp Request Timestamp Request CAPEC-296: ICMP Information Request ICMP Information Request CAPEC-297: TCP ACK Ping TCP ACK Ping CAPEC-298: UDP Ping UDP Ping CAPEC-299: TCP SYN Ping TCP SYN Ping CAPEC-300: Port Scanning Port Scanning CAPEC-301: TCP Connect Scan TCP Connect Scan CAPEC-302: TCP FIN Scan TCP FIN Scan CAPEC-303: TCP Xmas Scan TCP Xmas Scan CAPEC-304: TCP Null Scan TCP Null Scan CAPEC-305: TCP ACK Scan TCP ACK Scan CAPEC-306: TCP Window Scan TCP Window Scan CAPEC-307: TCP RPC Scan TCP RPC Scan CAPEC-308: UDP Scan UDP Scan CAPEC-309: Network Topology Mapping Network Topology Mapping CAPEC-310: Scanning for Vulnerable Software Scanning for Vulnerable Software CAPEC-312: Active OS Fingerprinting Active OS Fingerprinting CAPEC-313: Passive OS Fingerprinting Passive OS Fingerprinting CAPEC-317: IP ID Sequencing Probe IP ID Sequencing Probe CAPEC-318: IP 'ID' Echoed Byte-Order Probe IP 'ID' Echoed Byte-Order Probe CAPEC-319: IP (DF) 'Don't Fragment Bit' Echoing Probe IP (DF) 'Don't Fragment Bit' Echoing Probe CAPEC-320: TCP Timestamp Probe TCP Timestamp Probe CAPEC-321: TCP Sequence Number Probe TCP Sequence Number Probe CAPEC-322: TCP (ISN) Greatest Common Divisor Probe TCP (ISN) Greatest Common Divisor Probe CAPEC-323: TCP (ISN) Counter Rate Probe TCP (ISN) Counter Rate Probe CAPEC-324: TCP (ISN) Sequence Predictability Probe TCP (ISN) Sequence Predictability Probe CAPEC-325: TCP Congestion Control Flag (ECN) Probe TCP Congestion Control Flag (ECN) Probe CAPEC-326: TCP Initial Window Size Probe TCP Initial Window Size Probe CAPEC-327: TCP Options Probe TCP Options Probe CAPEC-328: TCP 'RST' Flag Checksum Probe TCP 'RST' Flag Checksum Probe CAPEC-329: ICMP Error Message Quoting Probe ICMP Error Message Quoting Probe CAPEC-330: ICMP Error Message Echoing Integrity Probe ICMP Error Message Echoing Integrity Probe CAPEC-472: Browser Fingerprinting Browser Fingerprinting CAPEC-497: File Discovery File Discovery CAPEC-508: Shoulder Surfing Shoulder Surfing CAPEC-573: Process Footprinting Process Footprinting CAPEC-574: Services Footprinting Services Footprinting CAPEC-575: Account Footprinting Account Footprinting CAPEC-576: Group Permission Footprinting Group Permission Footprinting CAPEC-577: Owner Footprinting Owner Footprinting CAPEC-616: Establish Rogue Location Establish Rogue Location CAPEC-643: Identify Shared Files/Directories on System Identify Shared Files/Directories on System CAPEC-646: Peripheral Footprinting Peripheral Footprinting CAPEC-651: Eavesdropping Eavesdropping

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-12784 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-12784 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Feb. 13, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
    Added CWE NVD-CWE-noinfo
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1y47a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1y47a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw48a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw48a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw49a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw49a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw50a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw50a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw51a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw51a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw54a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw54a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw55a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw55a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw56a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw56a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw57a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw57a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw58a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw58a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw59a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw59a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw63a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw63a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw64a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw64a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw65a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw65a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw66a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw66a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw67a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw67a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw68a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw68a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw72a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw72a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw73a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw73a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw74a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw74a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw75a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw75a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw76a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw76a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw77a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw77a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw78a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw78a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:7kw79a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:7kw79a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:93m22a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:93m22a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a28a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a28a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a29a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a29a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a30a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a30a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a31a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a31a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a32a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a32a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a33a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a33a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a34a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a34a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a35a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a35a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a38a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a38a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a46a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a46a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a47a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a47a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a48a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a48a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a51a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a51a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a52a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a52a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a53a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a53a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a56a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a56a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a57a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a57a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a58a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a58a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a59a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a59a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a60a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a60a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a63a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a63a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a66a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a66a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a75a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a75a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a76a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a76a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a77a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a77a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a78a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a78a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a79a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a79a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a80a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a80a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a81a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a81a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1a82a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1a82a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1y40a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1y40a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1y41a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1y41a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1y43a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1y43a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1y44a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1y44a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1y45a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1y45a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w1y46a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 002.2539e OR cpe:2.3:h:hp:w1y46a:-:*:*:*:*:*:*:*
    Added Reference Type HP Inc.: https://support.hp.com/us-en/document/ish_13229161-13229183-16/hpsbpi04074 Types: Vendor Advisory
  • New CVE Received by [email protected]

    Nov. 13, 2025

    Action Type Old Value New Value
    Added Description Certain HP LaserJet Pro printers may be vulnerable to information disclosure leading to credential exposure by altering the scan/send destination address and/or modifying the LDAP Server.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-200
    Added Reference https://support.hp.com/us-en/document/ish_13229161-13229183-16/hpsbpi04074
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 6.9
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Base CVSS Score: 4.9
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact