CVE-2025-3508 (GCVE-0-2025-3508)

Vulnerability from cvelistv5 – Published: 2025-07-25 15:58 – Updated: 2025-07-25 17:41
VLAI?
Title
Certain HP DesignJet products – Information disclosure
Summary
Certain HP DesignJet products may be vulnerable to information disclosure though printer's web interface allowing unauthenticated users to view sensitive print job information.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
hp
Impacted products
Vendor Product Version
HP Inc. Certain HP DesignJet products Affected: See HP Security Bulletin reference for affected versions.
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-3508",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-25T17:41:13.113319Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-25T17:41:27.327Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Certain HP DesignJet products",
          "vendor": "HP Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "See HP Security Bulletin reference for affected versions."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCertain HP DesignJet products may be vulnerable to information disclosure though printer\u0027s web interface allowing unauthenticated users to view sensitive print job information.\u003c/span\u003e"
            }
          ],
          "value": "Certain HP DesignJet products may be vulnerable to information disclosure though printer\u0027s web interface allowing unauthenticated users to view sensitive print job information."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "ADJACENT",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-25T15:58:36.045Z",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "url": "https://support.hp.com/us-en/document/ish_12798086-12798125-16/hpsbpi04039"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Certain HP DesignJet products \u2013 Information disclosure",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2025-3508",
    "datePublished": "2025-07-25T15:58:36.045Z",
    "dateReserved": "2025-04-10T16:35:04.057Z",
    "dateUpdated": "2025-07-25T17:41:27.327Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-3508\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2025-07-25T16:15:33.407\",\"lastModified\":\"2026-02-24T14:44:37.390\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain HP DesignJet products may be vulnerable to information disclosure though printer\u0027s web interface allowing unauthenticated users to view sensitive print job information.\"},{\"lang\":\"es\",\"value\":\"Algunos productos HP DesignJet pueden ser vulnerables a la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s de la interfaz web de la impresora, lo que permite que usuarios no autenticados vean informaci\u00f3n confidencial del trabajo de impresi\u00f3n.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"hp-security-alert@hp.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"hp-security-alert@hp.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z72e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"C8DC0ABC-C01F-4F81-8E94-E72775930DEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z72e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB5932DE-59CB-4E5F-85F4-E922715FDEFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z72f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"E64B1E48-C025-4515-AEDB-BB5422615F39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z72f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A229F789-06AF-49C4-B765-B00123BCE1D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z72g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"CE3D0BE8-5BFA-46FC-8DCA-7E158F9DD83F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z72g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FD00EAB-ABB0-4259-ADF1-8070BC428A93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z72h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"6F77F198-36AE-42FD-AA84-24ADB11C27D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z72h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29898A4-9E31-41D6-9F79-9AFFC854B0E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b55a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"D266B00E-571D-42CD-B478-7285CC513A44\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b55a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12ECB2C-3DC0-467D-8D69-A08C37964BC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b55b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"FF6F4A76-8007-498D-9976-C5318DA7CA0B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b55b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E16B02-6DD5-47C9-99FA-EB74822BBDEE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b55c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"E557FCAB-956C-41FB-AC12-2A38875F6AFD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b55c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BA5EFED-D058-48A5-85CE-A8F6D6A52F91\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b55d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"B7044F18-0B85-4A2C-8E0E-901D5063F216\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b55d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7015543D-B73B-4C20-AA24-2B619BCBC4B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b55e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"84AEB01F-BC3D-46B0-A47C-120C973C075C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b55e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABAA74C9-4901-468A-A4EF-504B3523E859\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b55f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"CCB25D21-4D32-49AA-8BBB-128E831131C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b55f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9F87607-7753-42E4-A24F-0FACF47DDD50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b55g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"7F3550D6-48B0-4E9A-B94B-D1A5D82A490C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b55g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3374A3D8-E1A4-4EDA-A0BB-56829B0295A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b55h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"D2254F39-2105-4125-B9EB-07EAD107ACFF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b55h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E6DD55C-E804-4643-B74C-5803B78E61D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b56a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"1903F750-0216-4839-961E-7E2BA3042EA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b56a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3DCC9ED-CFF2-418A-850B-6CE9F19B4BF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b56b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"05BE1BE6-3B01-4FE0-9A44-6E3A230746B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b56b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7322F9D-FA92-4E70-9AD4-6CAC17651F9A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b56c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"2CA9FD5C-E9BF-43BF-8ECC-C03029F43607\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b56c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4E20E57-5B36-4450-B2BA-E8811EBDA2FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b56d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"A056281B-DC48-42CF-A283-FDBD363CD5BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b56d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE067875-B132-4850-B228-04CA3F17EEF2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b56e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"2F6CD86E-1A6E-4897-AD33-E14C0DD518AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b56e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF75F96E-5359-4CA5-A79E-174E4282EF87\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b56f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"72D5B476-6C7A-4170-AAF9-FE3937FF0932\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b56f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DBBEFBC-34D4-470B-B4E9-1A7CE70EDC1C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b56g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"F28B1752-BBF7-424F-85DB-8546999689D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b56g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA573501-2681-4A28-A3DD-94751815B5FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w6b56h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"A7D1A9E8-0AAB-40BF-867A-38753B1D345C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w6b56h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"151FEF98-C854-4678-86B7-C954272DCA6F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:x9d24a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"6E9E050C-9F9C-4C23-9E17-C40A666F178C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:x9d24a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"660C6813-170E-4ACB-93C1-E2F86C4AA53C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:x9d24b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"233FBC45-8C83-4879-B348-9AF50173639C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:x9d24b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07D6B94A-65CD-4681-8B17-B2CA88F33C05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:x9d24c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"DF388A37-5106-41C3-BB09-9374E751C0E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:x9d24c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A75A613-F293-4902-A4FD-3B0D10CB3E3D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:x9d24d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"42C50720-8978-4B1A-A32D-776A1FD9AA11\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:x9d24d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B94BF3D8-0E20-488B-8B41-24F3B4A6D312\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:x9d24e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"8A4F67DB-7C4E-4D1A-B8F9-9F4011E13F48\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:x9d24e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A08596-FEF7-42C9-A5CD-A4D10AA53370\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:x9d24f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"AE7F53A6-1D18-4FFF-9DBD-E6F8B0D91242\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:x9d24f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E95D64-837B-417D-9CEC-139FB4381607\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:x9d24g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"7D837DDC-F75F-477D-AE57-A992C2502293\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:x9d24g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E82A428B-77F8-48F4-B7F3-E0213643B650\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:x9d24h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"68A820CF-ADC4-410D-8EB3-074EF72EAD5A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:x9d24h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A64015E-EFE9-456A-8F5D-1387CAE0A065\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:1vd83a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrp_09_25_22.1\",\"matchCriteriaId\":\"3E9346A0-66B0-47BE-AD8D-CA40B092D280\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:1vd83a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD543B8-F863-4F4D-B697-465179589ED2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:1vd84a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrp_09_25_22.1\",\"matchCriteriaId\":\"E4F58526-813A-4DC3-A7A6-FBC7C5FFAA27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:1vd84a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C6B5A95-313A-494A-A245-850686560C99\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:1vd85a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrp_09_25_22.1\",\"matchCriteriaId\":\"2AB76209-BB8B-4F40-9884-A00AAC16FE5A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:1vd85a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29772E7-A299-4574-BDC7-33A2A3662E98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:1vd86a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrp_09_25_22.1\",\"matchCriteriaId\":\"0BF39C72-9B5E-4357-B1C1-6E83D07836F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:1vd86a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4922FC47-0510-4574-8E6A-A68C81367E34\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:1vd87a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"18603B7E-8CBF-4596-B66A-1A5D3A5F49A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:1vd87a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9270E8C-5A77-41D9-9610-71905CB37EF7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:1vd87f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"B158C827-FF73-4B33-9841-A0A79FA8F96D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:1vd87f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E63D97-828C-45B8-87B0-9E159350D614\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:1vd88a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"89B9BA48-19FA-4B2C-8467-AFD76E127E66\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:1vd88a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D09DF5E-4E67-465B-BDDE-3A9F69BE306B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:1vd88b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"82F1523D-D1D2-4DD6-A0FA-4D58CD7CC998\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:1vd88b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8462ED4-D7C7-4A3F-BA94-10A98EE50C48\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:1vd88f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgrw_09_25_22.1\",\"matchCriteriaId\":\"0C28206B-E9EE-45F6-970E-943C9C6ECA9E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:1vd88f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53BCAF1B-953D-4D2C-BFAD-F7802A7875FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w15a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"BAE037CF-87B9-41DA-A76B-D6E736389990\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w15a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECB14BC8-CB57-4090-9898-97C9B2A54762\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w15b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"51C880F3-7D42-47FE-8CC4-B7D49F1CB38D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w15b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61CE110-09DC-4BAE-8F5E-8ED60B0CFFBC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w15c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"D132913A-C224-41C6-B62C-4087A258E261\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w15c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6631E97-708D-4120-93D4-D4DDCF8A82EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w15d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"B371F508-BCE3-4CB4-8B8F-EAC5BD179401\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w15d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A595B917-3F52-4374-8D84-41EF70E1A753\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w15e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"C91E2EA7-3071-4092-8EF4-39078A180054\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w15e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E9E1D59-0743-4A21-8511-FA6EA2CDD723\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w15f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"EFE8118A-5637-4DD5-921C-415CEEAD050F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w15f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96D93171-1976-441C-9FF3-507DC7923CA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w15g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"8BFA26E1-0462-43E1-B747-1064AC8110A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w15g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3546192B-366A-4EEF-AF61-9688D7FA5D70\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w15h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"33EB06D7-E0A4-429A-9E91-9D901C565970\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w15h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C8FF6A-ED93-41B8-92D7-9C722C8ADF5F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w16a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"A72CF98D-07D2-4E69-909B-DF8731D047E9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w16a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AAAD73A-23FA-4CAD-8C87-5D08C75F7EFE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w16b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"1045D413-52E0-4260-A0CB-0BABCA28E858\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w16b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D310FD2-98CE-42B6-AE1D-8CDE9E84760C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w16c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"C9D97FA6-8D79-4652-A686-29E90F6B7E57\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w16c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EC5ADBE-6165-42CB-892E-AAF2DBD5FA25\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w16d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"DFCA7E33-C6E8-4DEE-BEF2-57D29BA2D2C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w16d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B200F273-AA12-4FA4-A026-0E767669ED6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w16e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"4F08321F-6F73-4058-84F5-77ADF303F0C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w16e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"868B48D5-2C9E-4C86-B40E-839F3C59DEBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w16f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"511F527C-76FF-4DB9-BE2A-868BBC2D1823\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w16f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D081BC78-3F15-4019-92CB-493A7F7785D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w16g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"C0727105-0192-4AFC-825D-420C87395DA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w16g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71937E2D-820B-43C0-99D2-3AE25D6DD311\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w16h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"9F8AE903-2655-4466-938E-61017FDD8531\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w16h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D6AEE7F-A0C8-41A2-87D5-87FF0893531B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w18a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"A459A095-B37E-411D-B99D-9298E6AF1D82\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w18a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA1E19B0-DF67-475C-BD5B-28D4EFACCA2D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w18b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"81518CA7-0C65-44DF-86C2-B6990AE10150\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w18b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B7B223F-4528-4CB4-99D4-8DF4CED3018A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w18c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"DC3B972D-DBC5-4937-83C1-902D8ABF1D33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w18c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEAB43B1-C20F-4EDE-BCAA-9F99D5B1F66C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w18d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"2630DF43-C6AA-491D-8F74-9AFA6B02C0B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w18d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"951CBE71-E705-489E-859B-7BC68B63C6F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w18e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"40392A06-755C-4D5B-A7D1-B3C77D649CFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w18e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BD17C17-6FDD-499A-A629-6E0D2C47089C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w18f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"D9EB2894-6792-4A63-BA2D-F6760E096399\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w18f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AF52A77-B9E1-466E-AA09-351E179EC5F8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w18g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"885EE6BA-391C-4768-8B96-0C69DA3B2A2C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w18g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91EBCCDD-E19D-4BAC-BA14-D9CCE9A9AA44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t8w18h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr6_09_25_22.1\",\"matchCriteriaId\":\"80C8D788-C4AE-4DC3-B637-A1F4F87D56A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t8w18h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCDFF584-0685-40AB-9A4D-626B771D09AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z71a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"AF43FB98-0A71-4B66-8B6E-7A769E6FA84D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z71a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44BD2C77-D89A-40E6-8A1F-B91C29A02109\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z71b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"379E543B-7259-4452-8F91-25DEC687C322\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z71b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C8E458-82D4-4560-8CD6-B985C51492C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z71c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"8268E93E-1CD5-4D42-9012-C97F48E9901A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z71c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BB37E40-1756-4373-BEDC-B0E5A40EE484\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z71d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"84005EBA-5A79-4DE0-982B-5C453EAE63DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z71d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16FB8733-C89A-435B-9087-0C7C1587934E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z71e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"ACF91237-381F-48BB-AE30-CEDDBD9ED2F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z71e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD6C448-977A-49BE-995B-BD2BABEEF9D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z71f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"45D0E34A-B1F3-4CCE-A870-B3C19086A748\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z71f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDE62AD3-04F0-4252-B8FE-B99C127460A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z71g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"08F7B215-1A8F-4532-A295-3A9A32967046\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z71g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F097B6-2059-4970-97D9-23A42930B533\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z71h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"6F6AF7EC-D897-42DA-865B-099AE651F6D2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z71h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F0DE66-1803-4B40-9301-780EDF322D72\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z72a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"3AC48EA4-D708-4475-8875-38E51E25DC3F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z72a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"739BED28-6E21-4CE9-BC97-9EFE283632F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z72b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"FEC79213-37F6-4C2C-A03B-D35FD02DC7D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z72b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67359903-C641-477F-848C-B12F45F891AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z72c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"4F262423-02FE-4C9A-A68D-786F45742D50\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z72c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF70AD0F-27FD-47D6-95BC-75911714B733\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w3z72d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"jgr9_09_25_22.1\",\"matchCriteriaId\":\"FFCE37AE-E979-4D05-9F01-0F7C5303181A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w3z72d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F626680-8D4F-4643-A500-02855D884869\"}]}]}],\"references\":[{\"url\":\"https://support.hp.com/us-en/document/ish_12798086-12798125-16/hpsbpi04039\",\"source\":\"hp-security-alert@hp.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-3508\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-25T17:41:13.113319Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-25T17:41:22.525Z\"}}], \"cna\": {\"title\": \"Certain HP DesignJet products \\u2013 Information disclosure\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 6, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"HP Inc.\", \"product\": \"Certain HP DesignJet products\", \"versions\": [{\"status\": \"affected\", \"version\": \"See HP Security Bulletin reference for affected versions.\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://support.hp.com/us-en/document/ish_12798086-12798125-16/hpsbpi04039\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Certain HP DesignJet products may be vulnerable to information disclosure though printer\u0027s web interface allowing unauthenticated users to view sensitive print job information.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eCertain HP DesignJet products may be vulnerable to information disclosure though printer\u0027s web interface allowing unauthenticated users to view sensitive print job information.\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"74586083-13ce-40fd-b46a-8e5d23cfbcb2\", \"shortName\": \"hp\", \"dateUpdated\": \"2025-07-25T15:58:36.045Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-3508\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-25T17:41:27.327Z\", \"dateReserved\": \"2025-04-10T16:35:04.057Z\", \"assignerOrgId\": \"74586083-13ce-40fd-b46a-8e5d23cfbcb2\", \"datePublished\": \"2025-07-25T15:58:36.045Z\", \"assignerShortName\": \"hp\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…