CVE-2022-43780 (GCVE-0-2022-43780)
Vulnerability from cvelistv5
Published
2022-11-15 17:42
Modified
2025-04-30 15:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Certain HP ENVY, OfficeJet, and DeskJet printers may be vulnerable to a Denial of Service attack.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HP Inc. | Certain HP ENVY, OfficeJet, and DeskJet printers |
Version: See HP Security Bulletin reference for affected versions. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:40:06.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-43780", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-30T15:53:26.244228Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-30T15:53:32.082Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Certain HP ENVY, OfficeJet, and DeskJet printers", "vendor": "HP Inc.", "versions": [ { "status": "affected", "version": "See HP Security Bulletin reference for affected versions." } ] } ], "descriptions": [ { "lang": "en", "value": "Certain HP ENVY, OfficeJet, and DeskJet printers may be vulnerable to a Denial of Service attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-12T12:11:04.548Z", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "url": "https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813" } ], "x_generator": { "engine": "cveClient/1.0.13" } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2022-43780", "datePublished": "2022-11-15T17:42:54.646Z", "dateReserved": "2022-10-26T14:39:32.657Z", "dateUpdated": "2025-04-30T15:53:32.082Z", "requesterUserId": "9a761dcf-561b-4659-bf42-294748601a28", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-43780\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2022-12-12T13:15:15.037\",\"lastModified\":\"2025-04-30T16:15:29.720\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain HP ENVY, OfficeJet, and DeskJet printers may be vulnerable to a Denial of Service attack.\"},{\"lang\":\"es\",\"value\":\"Ciertas impresoras HP ENVY, OfficeJet y DeskJet pueden ser vulnerables a un ataque de Denegaci\u00f3n de Servicio (DoS).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u75a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"DDD773D3-6C73-4947-9A59-AD6D09F7C72A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u75a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F39C8823-0312-485E-A061-2546E28C5CF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u76a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"D7764EBB-7A08-411F-8BF7-4846B2ED3262\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u76a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F6F38A6-1D7D-45AF-9DD8-C78841E60EE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u77a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"20D75579-AB2C-47C6-8947-8EF9CA8CC1EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u77a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A02BAB-4D7B-4336-AC3C-97CE2F12F856\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u81a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"9467FEC6-614F-4C47-810B-98331D37477A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u81a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54E31973-1A54-489B-A673-C9308507729E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u81b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"1CD21651-A4C8-4551-8AA7-70AA3F917BE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u81b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4004CBA-77C1-4E03-A677-0C7CBEEF5F48\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u82a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"B03516E3-6DAF-422C-A1AA-F184DA2E9D1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u82a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"064A193C-80F8-4F9F-8F02-9CDC129164E9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u82b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"E2491F8D-41DE-4812-AB07-997155DD90C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u82b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F7B10E4-83E1-4DF9-9FB9-EC5F54284279\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u84a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"938031A9-D94B-44D4-B3DA-A291CC99F729\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u84a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6B15D7-87CF-469A-B3CF-CDD1C1AB9680\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u84b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"63B71122-F3A8-4E34-AA36-647E97EF2489\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u84b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A33D9D74-624A-4FF0-BE4F-46A2C9A8EADF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u85a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"6733B27E-12F5-4703-BBF9-CC8D6E9C3558\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u85a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12B7A9C4-7E53-40A8-BADC-61E87AC810C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u85b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"EF22FE5E-363A-41A8-A604-311119B6B084\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u85b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31A0BE2F-1311-4557-9F31-1FE67D8E4AD0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u86a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"F7F632F2-F780-4A16-BCDB-ACE020232641\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u86a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E36A392-DED5-479A-A8D2-7C2A7F60D8F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u86b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"30BA5BED-F7DB-4278-B3E0-9B82B4AAC524\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u86b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C025757-5381-4983-9F6C-975CB3B8B18F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u86c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"EEF53D16-BBE2-438A-959C-EBAB6CC22533\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u86c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92A5533F-5B58-4DF2-B52F-196669209F0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u87a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"075C551A-F8C2-48B5-BCF9-0E808CC1D9B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u87a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7F96555-E2D0-4FAC-9F31-6A06752ED150\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u87b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"D309819B-663B-4B4D-AF5B-45CF17B415B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u87b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A43B768-1523-44BE-ACA2-4C709163D1FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u88b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"E11B9E50-5548-4FA2-A9A4-9CEB4B74C24F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u88b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7EF7256-F0A3-4D2F-8D92-D5014DBF8D95\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u89b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"9E73139F-29A7-4096-971A-34078654B644\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u89b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D2E34D5-B4DF-4EB7-BCAE-73688E4DE3AB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u91a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"FA4BA9F4-B7DA-4C97-A978-A2E229C2CD2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u91a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC1C60CF-F05B-4B83-8F8E-A95DE1F78729\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u91b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"180B8701-1BA4-47FA-8588-595C6EA20D6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u91b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3F42463-735F-4968-A867-93EFEE272F63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u92a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"1005D40E-2CB3-4553-8C11-57C27349A8CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u92a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D87589A-6BDB-4857-BEE0-AC0F703C39CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u92b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"B84F1EAA-4270-498D-A0F6-9FCFEB99B261\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u92b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6DF09B2-585A-492E-8609-736EDE471D90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u94a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"BDC93470-9D6E-4BB1-8F5F-C79DC979EA13\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u94a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A20151D-0532-40BC-81D1-1AE9A76E3DE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u94b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"2D2D4978-BC2A-445B-BBDE-BB638E862260\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u94b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"812CCCFA-77C0-4A00-B85D-02E5DA2807E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a54a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"30E5FB33-FFCA-4EA6-B8E7-941B0CFAA10F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a54a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0753EE8-5937-4304-96A7-6807A948FBE9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a59a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"72FAA176-3162-4262-AE59-2854BD3A67CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a59a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E982A33-3344-47CE-8D42-F742B41E691D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a60a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"F29079A5-06CE-4217-B858-FA5B757320F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a60a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1235C9D8-1DBE-463B-A359-DAC30624DA7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a61a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"60449328-A25C-4C07-BE54-6430C6D1611A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a61a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAA1836B-6724-4783-985A-003E46F90890\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a61b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"E64522FE-6E3C-4999-A284-A46C51680C07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a61b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B073F3BD-5ED0-420E-BEB4-D99134BB8E9D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a69a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"F6A740FC-DD2A-4BEC-8051-F71012D04ED9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a69a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C309039-528E-43FB-B45A-6E387097F753\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a70a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"796A7055-202E-430A-AAEA-5A6869799B0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a70a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DD72D0A-0842-4D16-A907-5147F1C5C369\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a71a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"4D92D8EA-FFFC-419A-84AE-163ECDFCA143\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a71a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28CAB47-6D5C-452B-A3B7-0C427D8D2BF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a73a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"23AF8591-2BCA-4312-8FC2-4C182BA3E1FA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a73a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED506F2-9512-47D5-B59E-153F184350F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a74a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"39504855-F6B9-4034-B9B6-D1D51B32DBA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a74a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"221A72D5-9C6D-4038-89CF-C0FD3BF3C585\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b12a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"F3DB6723-19E6-4D7A-A137-F9C6E217DC38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b12a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4855BC29-F2D8-42F8-B3D0-71752055BED5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b13a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"7134ECAB-80EE-4285-B6F7-96DB1EBC0217\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b13a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B2DA4FF-2187-426E-BC74-D7DEBCDEFD48\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b14a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"5CBC6E92-0AAA-41B0-82AE-3A80AC684D67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b14a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43385589-C6FE-45A9-916D-4C25A9189874\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b18a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"B4CB24A6-9925-4C1C-AE11-3F03142AC66D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b18a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"466BCAF3-0FE4-4E70-BCA7-DAE8C581CBC8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b27a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"7697583D-B42D-4A78-BD8E-6F6A1E1D52D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b27a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9C389D7-24BA-4D78-ACDC-F2BE719F2D3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b28a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"DBB9CC23-9B67-4585-A795-46A12339E3B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b28a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D327035-BE36-4C7D-95F8-51D90B38DBF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b29a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"A785FBA9-A7B4-41F3-A3A3-0B8FF5B493FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b29a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A1590D2-8F99-4AED-A947-6C18D105D055\"}]}]}],\"references\":[{\"url\":\"https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813\",\"source\":\"hp-security-alert@hp.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:40:06.282Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-43780\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-30T15:53:26.244228Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-30T15:53:17.380Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"HP Inc.\", \"product\": \"Certain HP ENVY, OfficeJet, and DeskJet printers\", \"versions\": [{\"status\": \"affected\", \"version\": \"See HP Security Bulletin reference for affected versions.\"}]}], \"references\": [{\"url\": \"https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813\"}], \"x_generator\": {\"engine\": \"cveClient/1.0.13\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Certain HP ENVY, OfficeJet, and DeskJet printers may be vulnerable to a Denial of Service attack.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"74586083-13ce-40fd-b46a-8e5d23cfbcb2\", \"shortName\": \"hp\", \"dateUpdated\": \"2022-12-12T12:11:04.548Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2022-43780\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-30T15:53:32.082Z\", \"dateReserved\": \"2022-10-26T14:39:32.657Z\", \"assignerOrgId\": \"74586083-13ce-40fd-b46a-8e5d23cfbcb2\", \"datePublished\": \"2022-11-15T17:42:54.646Z\", \"requesterUserId\": \"9a761dcf-561b-4659-bf42-294748601a28\", \"assignerShortName\": \"hp\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…