6.5
MEDIUM CVSS 3.1
CVE-2025-3508
Certain HP DesignJet products – Information disclosure
Description

Certain HP DesignJet products may be vulnerable to information disclosure though printer's web interface allowing unauthenticated users to view sensitive print job information.

INFO

Published Date :

July 25, 2025, 4:15 p.m.

Last Modified :

Feb. 24, 2026, 2:44 p.m.

Remotely Exploit :

No
Affected Products

The following products are affected by CVE-2025-3508 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Hp w3z72e_firmware
2 Hp w3z72e
3 Hp w3z72f_firmware
4 Hp w3z72f
5 Hp w3z72g_firmware
6 Hp w3z72g
7 Hp w3z72h_firmware
8 Hp w3z72h
9 Hp w6b55a_firmware
10 Hp w6b55a
11 Hp w6b55b_firmware
12 Hp w6b55b
13 Hp w6b55c_firmware
14 Hp w6b55c
15 Hp w6b55d_firmware
16 Hp w6b55d
17 Hp w6b55e_firmware
18 Hp w6b55e
19 Hp w6b55f_firmware
20 Hp w6b55f
21 Hp w6b55g_firmware
22 Hp w6b55g
23 Hp w6b55h_firmware
24 Hp w6b55h
25 Hp w6b56a_firmware
26 Hp w6b56a
27 Hp w6b56b_firmware
28 Hp w6b56b
29 Hp w6b56c_firmware
30 Hp w6b56c
31 Hp w6b56d_firmware
32 Hp w6b56d
33 Hp w6b56e_firmware
34 Hp w6b56e
35 Hp w6b56f_firmware
36 Hp w6b56f
37 Hp w6b56g_firmware
38 Hp w6b56g
39 Hp w6b56h_firmware
40 Hp w6b56h
41 Hp x9d24a_firmware
42 Hp x9d24a
43 Hp x9d24b_firmware
44 Hp x9d24b
45 Hp x9d24c_firmware
46 Hp x9d24c
47 Hp x9d24d_firmware
48 Hp x9d24d
49 Hp x9d24e_firmware
50 Hp x9d24e
51 Hp x9d24f_firmware
52 Hp x9d24f
53 Hp x9d24g_firmware
54 Hp x9d24g
55 Hp x9d24h_firmware
56 Hp x9d24h
57 Hp 1vd83a_firmware
58 Hp 1vd83a
59 Hp 1vd84a_firmware
60 Hp 1vd84a
61 Hp 1vd85a_firmware
62 Hp 1vd85a
63 Hp 1vd86a_firmware
64 Hp 1vd86a
65 Hp 1vd87a_firmware
66 Hp 1vd87a
67 Hp 1vd87f_firmware
68 Hp 1vd87f
69 Hp 1vd88a_firmware
70 Hp 1vd88a
71 Hp 1vd88b_firmware
72 Hp 1vd88b
73 Hp 1vd88f_firmware
74 Hp 1vd88f
75 Hp t8w15a_firmware
76 Hp t8w15a
77 Hp t8w15b_firmware
78 Hp t8w15b
79 Hp t8w15c_firmware
80 Hp t8w15c
81 Hp t8w15d_firmware
82 Hp t8w15d
83 Hp t8w15e_firmware
84 Hp t8w15e
85 Hp t8w15f_firmware
86 Hp t8w15f
87 Hp t8w15g_firmware
88 Hp t8w15g
89 Hp t8w15h_firmware
90 Hp t8w15h
91 Hp t8w16a_firmware
92 Hp t8w16a
93 Hp t8w16b_firmware
94 Hp t8w16b
95 Hp t8w16c_firmware
96 Hp t8w16c
97 Hp t8w16d_firmware
98 Hp t8w16d
99 Hp t8w16e_firmware
100 Hp t8w16e
101 Hp t8w16f_firmware
102 Hp t8w16f
103 Hp t8w16g_firmware
104 Hp t8w16g
105 Hp t8w16h_firmware
106 Hp t8w16h
107 Hp t8w18a_firmware
108 Hp t8w18a
109 Hp t8w18b_firmware
110 Hp t8w18b
111 Hp t8w18c_firmware
112 Hp t8w18c
113 Hp t8w18d_firmware
114 Hp t8w18d
115 Hp t8w18e_firmware
116 Hp t8w18e
117 Hp t8w18f_firmware
118 Hp t8w18f
119 Hp t8w18g_firmware
120 Hp t8w18g
121 Hp t8w18h_firmware
122 Hp t8w18h
123 Hp w3z71a_firmware
124 Hp w3z71a
125 Hp w3z71b_firmware
126 Hp w3z71b
127 Hp w3z71c_firmware
128 Hp w3z71c
129 Hp w3z71d_firmware
130 Hp w3z71d
131 Hp w3z71e_firmware
132 Hp w3z71e
133 Hp w3z71f_firmware
134 Hp w3z71f
135 Hp w3z71g_firmware
136 Hp w3z71g
137 Hp w3z71h_firmware
138 Hp w3z71h
139 Hp w3z72a_firmware
140 Hp w3z72a
141 Hp w3z72b_firmware
142 Hp w3z72b
143 Hp w3z72c_firmware
144 Hp w3z72c
145 Hp w3z72d_firmware
146 Hp w3z72d
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
CVSS 4.0 MEDIUM [email protected]
Solution
Update printer firmware and restrict web interface access to prevent unauthorized information viewing.
  • Update printer firmware to the latest version.
  • Restrict access to the printer's web interface.
  • Disable unnecessary network services on the printer.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-3508.

URL Resource
https://support.hp.com/us-en/document/ish_12798086-12798125-16/hpsbpi04039 Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-3508 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-3508 weaknesses.

CAPEC-13: Subverting Environment Variable Values Subverting Environment Variable Values CAPEC-22: Exploiting Trust in Client Exploiting Trust in Client CAPEC-59: Session Credential Falsification through Prediction Session Credential Falsification through Prediction CAPEC-60: Reusing Session IDs (aka Session Replay) Reusing Session IDs (aka Session Replay) CAPEC-79: Using Slashes in Alternate Encoding Using Slashes in Alternate Encoding CAPEC-116: Excavation Excavation CAPEC-169: Footprinting Footprinting CAPEC-224: Fingerprinting Fingerprinting CAPEC-285: ICMP Echo Request Ping ICMP Echo Request Ping CAPEC-287: TCP SYN Scan TCP SYN Scan CAPEC-290: Enumerate Mail Exchange (MX) Records Enumerate Mail Exchange (MX) Records CAPEC-291: DNS Zone Transfers DNS Zone Transfers CAPEC-292: Host Discovery Host Discovery CAPEC-293: Traceroute Route Enumeration Traceroute Route Enumeration CAPEC-294: ICMP Address Mask Request ICMP Address Mask Request CAPEC-295: Timestamp Request Timestamp Request CAPEC-296: ICMP Information Request ICMP Information Request CAPEC-297: TCP ACK Ping TCP ACK Ping CAPEC-298: UDP Ping UDP Ping CAPEC-299: TCP SYN Ping TCP SYN Ping CAPEC-300: Port Scanning Port Scanning CAPEC-301: TCP Connect Scan TCP Connect Scan CAPEC-302: TCP FIN Scan TCP FIN Scan CAPEC-303: TCP Xmas Scan TCP Xmas Scan CAPEC-304: TCP Null Scan TCP Null Scan CAPEC-305: TCP ACK Scan TCP ACK Scan CAPEC-306: TCP Window Scan TCP Window Scan CAPEC-307: TCP RPC Scan TCP RPC Scan CAPEC-308: UDP Scan UDP Scan CAPEC-309: Network Topology Mapping Network Topology Mapping CAPEC-310: Scanning for Vulnerable Software Scanning for Vulnerable Software CAPEC-312: Active OS Fingerprinting Active OS Fingerprinting CAPEC-313: Passive OS Fingerprinting Passive OS Fingerprinting CAPEC-317: IP ID Sequencing Probe IP ID Sequencing Probe CAPEC-318: IP 'ID' Echoed Byte-Order Probe IP 'ID' Echoed Byte-Order Probe CAPEC-319: IP (DF) 'Don't Fragment Bit' Echoing Probe IP (DF) 'Don't Fragment Bit' Echoing Probe CAPEC-320: TCP Timestamp Probe TCP Timestamp Probe CAPEC-321: TCP Sequence Number Probe TCP Sequence Number Probe CAPEC-322: TCP (ISN) Greatest Common Divisor Probe TCP (ISN) Greatest Common Divisor Probe CAPEC-323: TCP (ISN) Counter Rate Probe TCP (ISN) Counter Rate Probe CAPEC-324: TCP (ISN) Sequence Predictability Probe TCP (ISN) Sequence Predictability Probe CAPEC-325: TCP Congestion Control Flag (ECN) Probe TCP Congestion Control Flag (ECN) Probe CAPEC-326: TCP Initial Window Size Probe TCP Initial Window Size Probe CAPEC-327: TCP Options Probe TCP Options Probe CAPEC-328: TCP 'RST' Flag Checksum Probe TCP 'RST' Flag Checksum Probe CAPEC-329: ICMP Error Message Quoting Probe ICMP Error Message Quoting Probe CAPEC-330: ICMP Error Message Echoing Integrity Probe ICMP Error Message Echoing Integrity Probe CAPEC-472: Browser Fingerprinting Browser Fingerprinting CAPEC-497: File Discovery File Discovery CAPEC-508: Shoulder Surfing Shoulder Surfing CAPEC-573: Process Footprinting Process Footprinting CAPEC-574: Services Footprinting Services Footprinting CAPEC-575: Account Footprinting Account Footprinting CAPEC-576: Group Permission Footprinting Group Permission Footprinting CAPEC-577: Owner Footprinting Owner Footprinting CAPEC-616: Establish Rogue Location Establish Rogue Location CAPEC-643: Identify Shared Files/Directories on System Identify Shared Files/Directories on System CAPEC-646: Peripheral Footprinting Peripheral Footprinting CAPEC-651: Eavesdropping Eavesdropping

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-3508 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-3508 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Feb. 24, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z72e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z72e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z72f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z72f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z72g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z72g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z72h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z72h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b55a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b55a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b55b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b55b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b55c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b55c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b55d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b55d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b55e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b55e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b55f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b55f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b55g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b55g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b55h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b55h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b56a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b56a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b56b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b56b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b56c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b56c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b56d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b56d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b56e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b56e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b56f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b56f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b56g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b56g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w6b56h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:w6b56h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:x9d24a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:x9d24a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:x9d24b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:x9d24b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:x9d24c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:x9d24c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:x9d24d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:x9d24d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:x9d24e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:x9d24e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:x9d24f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:x9d24f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:x9d24g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:x9d24g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:x9d24h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:x9d24h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:1vd83a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrp_09_25_22.1 OR cpe:2.3:h:hp:1vd83a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:1vd84a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrp_09_25_22.1 OR cpe:2.3:h:hp:1vd84a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:1vd85a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrp_09_25_22.1 OR cpe:2.3:h:hp:1vd85a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:1vd86a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrp_09_25_22.1 OR cpe:2.3:h:hp:1vd86a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:1vd87a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:1vd87a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:1vd87f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:1vd87f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:1vd88a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:1vd88a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:1vd88b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:1vd88b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:1vd88f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgrw_09_25_22.1 OR cpe:2.3:h:hp:1vd88f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w15a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w15a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w15b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w15b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w15c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w15c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w15d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w15d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w15e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w15e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w15f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w15f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w15g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w15g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w15h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w15h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w16a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w16a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w16b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w16b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w16c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w16c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w16d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w16d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w16e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w16e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w16f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w16f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w16g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w16g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w16h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w16h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w18a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w18a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w18b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w18b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w18c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w18c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w18d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w18d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w18e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w18e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w18f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w18f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w18g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w18g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t8w18h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr6_09_25_22.1 OR cpe:2.3:h:hp:t8w18h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z71a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z71a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z71b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z71b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z71c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z71c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z71d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z71d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z71e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z71e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z71f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z71f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z71g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z71g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z71h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z71h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z72a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z72a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z72b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z72b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z72c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z72c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w3z72d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jgr9_09_25_22.1 OR cpe:2.3:h:hp:w3z72d:-:*:*:*:*:*:*:*
    Added Reference Type HP Inc.: https://support.hp.com/us-en/document/ish_12798086-12798125-16/hpsbpi04039 Types: Vendor Advisory
  • New CVE Received by [email protected]

    Jul. 25, 2025

    Action Type Old Value New Value
    Added Description Certain HP DesignJet products may be vulnerable to information disclosure though printer's web interface allowing unauthenticated users to view sensitive print job information.
    Added CVSS V4.0 AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-200
    Added Reference https://support.hp.com/us-en/document/ish_12798086-12798125-16/hpsbpi04039
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 6
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Base CVSS Score: 6.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact