ID CVE-2017-2741
Summary A potential security vulnerability has been identified with HP PageWide Printers, HP OfficeJet Pro Printers, with firmware before 1708D. This vulnerability could potentially be exploited to execute arbitrary code.
References
Vulnerable Configurations
  • cpe:2.3:o:hp:j9v82a_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:j9v82a_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:j9v82b_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hp:j9v82b_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:j9v82b:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:j9v82b:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:j9v82c_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hp:j9v82c_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:j9v82c:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:j9v82c:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:j9v82d_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:j9v82d_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:j6u55a_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:j6u55a_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:j6u55b_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hp:j6u55b_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:j6u55b:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:j6u55b:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:j6u55c_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hp:j6u55c_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:j6u55c:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:j6u55c:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:j6u55d_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:j6u55d_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:k9z76a_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:k9z76a_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:k9z76d_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:k9z76d_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q17a_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q17a_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q17c_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q17c_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q17c:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q17c:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q17d_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q17d_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q21a_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q21a_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q21c_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q21c_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q21d_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q21d_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q20a_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q20a_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q20b_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q20b_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q20c_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q20c_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q20d_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q20d_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q16a_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q16a_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q16b_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q16b_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q16b:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q16b:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q16c_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q16c_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q16c:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q16c:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q16d_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q16d_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q19a_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q19a_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q19d_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q19d_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q15a_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q15a_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q15b_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q15b_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d3q15d_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d3q15d_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:j9v80a_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:j9v80a_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:j9v80b_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:j9v80b_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:j6u57b_firmware:001.1937d:*:*:*:*:*:*:*
    cpe:2.3:o:hp:j6u57b_firmware:001.1937d:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d9l20a_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d9l20a_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d9l20a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d9l20a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d9l21a_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d9l21a_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d9l21a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d9l21a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d9l63a_firmware:001.1937c:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d9l63a_firmware:001.1937c:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:d9l64a_firmware:001.1937c:*:*:*:*:*:*:*
    cpe:2.3:o:hp:d9l64a_firmware:001.1937c:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:t0g70a_firmware:001.1937c:*:*:*:*:*:*:*
    cpe:2.3:o:hp:t0g70a_firmware:001.1937c:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:j3p68a_firmware:001.1937c:*:*:*:*:*:*:*
    cpe:2.3:o:hp:j3p68a_firmware:001.1937c:*:*:*:*:*:*:*
  • cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*
    cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
exploit-db
  • 42176
  • 45273
hp HPSBPI03555
Last major update 03-10-2019 - 00:03
Published 23-01-2018 - 16:29
Last modified 03-10-2019 - 00:03
Back to Top