CVE-2025-26506 (GCVE-0-2025-26506)

Vulnerability from cvelistv5 – Published: 2025-02-14 16:58 – Updated: 2025-02-14 17:23
VLAI?
Title
Certain HP LaserJet Pro, HP LaserJet Enterprise, HP LaserJet Managed Printers – Potential Remote Code Execution and Potential Elevation of Privilege
Summary
Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job.
CWE
Assigner
hp
Impacted products
Vendor Product Version
HP, Inc. Certain HP LaserJet Pro, HP LaserJet Enterprise, HP LaserJet Managed Printers Affected: See HP security bulletin reference for affected versions
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-26506",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-14T17:13:43.148071Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-14T17:23:15.086Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Certain HP LaserJet Pro, HP LaserJet Enterprise, HP LaserJet Managed Printers",
          "vendor": "HP, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "See HP security bulletin reference for affected versions"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCertain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job.\u003c/span\u003e"
            }
          ],
          "value": "Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "HIGH",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 9.2,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-14T16:58:09.823Z",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "url": "https://support.hp.com/us-en/document/ish_11953771-11953793-16/hpsbpi04007"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Certain HP LaserJet Pro, HP LaserJet Enterprise, HP LaserJet Managed Printers \u2013 Potential Remote Code Execution and Potential Elevation of Privilege",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2025-26506",
    "datePublished": "2025-02-14T16:58:09.823Z",
    "dateReserved": "2025-02-11T20:23:19.623Z",
    "dateUpdated": "2025-02-14T17:23:15.086Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-26506\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2025-02-14T17:15:22.747\",\"lastModified\":\"2026-01-15T14:41:31.653\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job.\"},{\"lang\":\"es\",\"value\":\"Algunas impresoras HP LaserJet Pro, HP LaserJet Enterprise y HP LaserJet Managed pueden ser potencialmente vulnerables a la ejecuci\u00f3n remota de c\u00f3digo y a la elevaci\u00f3n de privilegios al procesar un trabajo de impresi\u00f3n PostScript.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"hp-security-alert@hp.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":9.2,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"hp-security-alert@hp.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q9e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"28863A27-156A-4F4C-83A4-7BB740B5346D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q9e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AEB19D-2EA4-423B-8D1C-1CD8D676E585\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q9f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"F6195E89-37B2-4843-8F69-A1DB3BE9532B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q9f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D5CFB04-2DA7-4EBC-AB4F-CE11DBF3BB8B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499r0a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"695B50FD-9A73-4C21-BFE0-C89BC1112AE7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499r0a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1296D073-92D9-4B59-A7DB-28899383C265\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499r0e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"F0286587-0A1D-4D2C-AA0B-004AE5FA953B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499r0e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E04BFDD-A6AE-4749-BD27-B5BE5B6FED27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499r0f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"2F3C52FF-C6AF-4CB6-884D-8185613BAA39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499r0f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E423A39B-85FB-485C-AADE-6B6EAF0E94C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra80a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"CA15550A-0D87-483E-AD25-5E43D3B4A88F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra80a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C83B93C-7435-4CA8-B94C-0FA51F8958D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra80e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"76E7236A-24BA-4134-97FB-741E2A69BC1E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra80e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F4CB46A-B2F6-41FE-9A07-38AE0EECCDDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra80f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"E9CEE1F4-120B-4E39-8C02-DEE200E1B106\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra80f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD9835AF-D29C-4A3C-BDFE-A8D3F1E24E2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra81a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"22B032F5-3C13-4384-AC41-9CD0D137D017\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra81a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A9D0C1A-9DD2-4465-8266-EB3A9585B703\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra81e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"8415418A-EC6C-4568-98D9-E784B13A12F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra81e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EC3CED-E91D-4878-848F-0D7E636ED58C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra81f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"1A4C37CB-4F87-49FE-81C7-5C8E48D64AE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra81f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0C4B3BB-57EF-41E0-9798-048E7F2FEC02\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra81fr_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"98A239FC-DFD9-4AFF-AD4B-ACBCBE3C5B46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra81fr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB4A61B7-C94F-42A2-BCF8-05C7B2812395\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra82a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"06776A50-06DB-409E-B1FA-43977C12D85E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra82a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52F42474-E1DE-4514-B3C0-02935510014E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra82e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"B6B7D3D2-A628-47C0-8C17-DAC13B194F07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra82e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEF277A7-0883-4109-B205-5313E8107323\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra82f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"81C92A52-445A-41DB-8550-338A8102C326\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra82f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45AEA857-8272-43AC-98E0-E8ADA5B253F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra82fr_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"8F0DC523-B83E-48F0-8A14-E6EAEB1C600E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra82fr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A516C99B-E87B-44FD-8832-9956E6E46AF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra83a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"5B89A707-F84E-45E1-8C3C-34D1CF65D70F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra83a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7517EAE0-F84B-4447-BCF6-D55312AD05F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra83e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"ACC636A7-46B7-4330-B656-98186D658CCE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra83e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98756841-A91C-469C-B0AF-934849CB5B40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra83f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"BE368FBB-463E-4998-AF9A-7711362D1C0C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra83f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CDEBEB5-6310-4C2C-8D12-7D87F028BC42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra84a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"88E6A528-DCD6-430F-887E-4084242D952A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra84a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF1E07A-EA1C-4768-AD6C-48DC8044DD1C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra84e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"8E12CFF1-6ADD-44C4-90C1-659DBF06AA39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra84e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8083503E-B48A-4DBA-B290-065267DA1F02\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra84f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"305BCA8E-A4F0-4036-92BE-54702EB38B3A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra84f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88C8F6C8-EC90-4146-939C-2BDEAB44055B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra85a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"070BE3E3-B0AC-4FC2-96F9-DEDBBE33CDFF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra85a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E9850E2-DFD3-461E-957C-C823DAC04CCF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra85e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"03FDEADC-4ED5-4039-8957-9A93E54F3F07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra85e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B599A94-1027-4910-98FF-EEBB3D8C4582\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra85f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"EB4945C0-7DFC-40D0-939E-CD10C1E0F88F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra85f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E32C56E-B34A-4424-ACCB-BAE2C3AF6EFD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra85v_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"642565D6-E3F6-4C33-AAA4-D93EEE80AB9C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra85v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42424AB2-E79B-4F6B-A895-A07BED5BCE81\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra86a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"24918B45-3CA8-4347-852A-12106D008372\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra86a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A15380FB-D081-42B9-8C21-9F911EFA0AC0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra86e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"58549FEA-4E29-49A2-91F2-0077A65D5656\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra86e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F992F9F-4622-47EC-A280-7DE495F260E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra86f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"2162B386-8971-4CC9-99F0-C7EB3C376445\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra86f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E499DCB9-50CF-491A-9937-6E50B0619318\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra87a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"C1787657-6F42-4336-82E1-86C9634D9A45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra87a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22F32E01-0FE2-4D55-8CF6-926FDD32C434\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra87e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"60101089-13DE-49BA-B3A2-5B9AD283130E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra87e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E954CB3-D4C0-40F7-A314-4A4CDA347F7D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra87f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"249661F6-1072-4B4B-940E-589E190C12DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra87f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91D0FF64-CA66-448C-A71D-ECFD5963836E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra88a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"F4B86ED9-84A1-4DD4-BBD7-F28227303CD6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra88a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92745B24-B348-44A5-ABD5-9AB156FA7E34\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra88e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"C0A6A56E-EB83-44D0-A161-8C9B39C5C8B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra88e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E690EE9B-A7AF-47DB-B1AB-857EB80FF66D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra88f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"10D1FC98-644C-48C2-8CA4-8C18253BDE31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra88f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F60B00A-44F9-459F-BC87-D86BB39EA9E5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra89a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"A168A742-6830-49A5-A08A-77F38C8626CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra89a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA1B7B75-3B8B-41EB-879C-F77921E66FDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ra89v_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"0BCD450A-CCF3-402D-A03C-5E97C9E13684\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ra89v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"002EC198-E2AE-48B3-86F9-F35B6681E6B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh48a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"BD9070E9-A8F2-4849-9869-25B7E09B3D27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh48a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59E52B4E-7DA3-495B-98D9-D932E123F227\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh48v_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"E996A7A1-8461-452A-8034-26A9512845BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh48v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"023EB37F-AF96-45A0-A7EB-1BC977FAED4D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh51a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"8F37FCF1-DBB0-44F5-91F0-198E8142B4B7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh51a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F552C79B-97A7-4A62-BF47-3C00F33D898A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499m6a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"66166C94-3680-4795-8997-F903F0B61848\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499m6a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE7BFDE5-E4BB-456C-899E-3C4358DA28BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499m7a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"6D3AB7AC-E8E2-4BC2-990E-23BE2B185F6E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499m7a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E17CB3E-4096-4178-A781-16FDEBFF3B74\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh52a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"4420379B-18D3-445A-8395-483876456002\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh52a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5467B3B7-F3E9-4095-8849-6E1CD474F1F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh53a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"BDDBD786-2B7D-4185-A6C2-110DD95CA4A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh53a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"172707E5-E8EB-44F4-99EC-9FB8CF1A07A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh59a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"2600157B-4EA5-4236-8D73-7435D1C9D9C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh59a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5185CC9B-F0FA-497D-A532-F471C0443273\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh64a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"1A5F9EC7-3EB3-4551-B2F5-46B79BDB9027\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh64a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56D43453-A971-4C3A-AB16-B3869BCD10AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh64e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"D12048D3-4543-4297-A169-C522EE95D49C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh64e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03759DFC-F4DE-4796-8D9A-94BEFB17468F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh64f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"B1CCE977-2CA5-416B-93FB-A7D649CC6572\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh64f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B977AB8-D20C-45B1-83C3-7586CEFA25B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh65a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"F1029479-671B-4698-8DC3-B7B8BF076E3F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh65a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F6C97E0-5258-48C0-854E-60FC3F9E73D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh66a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"9E714E6A-FFC2-4F1E-B404-DA62539EB323\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh66a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E277097A-37DD-4AAD-85B6-32D884323319\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh67a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"2A246540-01B9-47D8-B93D-701B19C8AD39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh67a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17A6F58F-C7AB-4396-BF44-CAA9ABA645B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh72a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"58EE93F9-32A9-43B2-AE9E-4B4A41672C84\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh72a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF973C7F-775E-433B-B37D-0130D4149BF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5hh73a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"C3373B94-7499-4174-B7C0-850AA2F2516A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5hh73a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65A83588-CE7A-4E52-A2F4-81B628C65ABA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:74p25a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"AF6B2DB5-9AC4-4C76-8E1A-02F611711342\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:74p25a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05AD132F-FC18-4C8D-B97E-45CA84694733\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:74p26a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"42160E90-F9D6-40C1-B920-74E32BAB2070\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:74p26a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9E3999C-17DC-4D20-A80A-2E0755B33A96\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:74p27a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"BC5B6FD1-291D-4012-8403-F707155E6D44\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:74p27a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0557138A-CB59-494C-858A-F2339E02A917\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:74p28a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"A5527D57-C307-4BE9-AF38-5AB9129EB3A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:74p28a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6E09CCA-F893-4E65-AFBA-DCF45C1DACDF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:74t92a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"3B290C69-9827-42D1-8FC4-CBE152096F29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:74t92a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73498304-9BF3-4AE5-9082-D8AD3F529C32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:74t92e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"94B2B7AF-6B76-44AF-9CD6-D682D193A2AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:74t92e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5B8F923-BB39-4B12-9F3C-8B54D03AC213\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:74t92f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"CA6DECEE-5376-474A-AA63-66DA9C828B88\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:74t92f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F2DA59-52BF-4242-BDFB-6CEF19B6B4F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:759v0e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"823392D5-5CC4-4075-A249-0DC5446096BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:759v0e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A38A0B6A-2F0F-4CDD-869E-D86B660EFAF7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:759v0f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"587D0028-FB05-4CEB-AC55-B09EBDCBCA39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:759v0f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE1A1ABF-21CA-4572-8638-56278FB16D6F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:759v1e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"D0700342-606E-45B1-AEB4-F454A5A29828\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:759v1e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83711D0-41B6-433F-87AA-A987940BCBFD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:759v1f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"473A06FB-1CA4-42BF-9DD1-1234CE930F6D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:759v1f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02259287-6E12-45D7-9355-82A5793712FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:759v2e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"A19FBAD1-195A-4FDC-9C43-C287056AC80F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:759v2e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79FACFC1-AE16-4494-8870-153C4A2AE5CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:759v2f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"73339D5B-8FDF-489B-A6A6-146381BBBAFA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:759v2f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3FE849B-08ED-46E0-A916-77D2AEAF1FA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:8d7l0a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"78CEFFBA-58DD-49AB-97DA-6798C2341C2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:8d7l0a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E6F081-EDB1-4171-91FE-086682824750\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:8d7l1a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"2EC778AA-7AC1-4082-ACA3-161B275963D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:8d7l1a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17ADC0CC-4470-4BC4-A68D-61DCDA6D0546\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:8d7l2a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"600EA116-6E6A-440D-9F97-0563BA4C9C9B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:8d7l2a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00438D4E-F824-4AE0-8969-E1CB469FA8C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499m8a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"8E8BDC3F-57D6-4C88-8FFB-CD69D3FD170C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499m8a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E73DA651-BD5A-4A26-9215-7694620ACC32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499m9a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"A579CDED-0822-4EC7-8659-35ADA8472955\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499m9a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5615BE39-E1EC-44FF-A4CB-661FEF7A0665\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499n0a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"A6F54610-41B0-4533-9A24-E1685FC0331D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499n0a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D31155D-D56D-4B16-B00A-0FA04D94190B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499n1a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"72464098-33B1-4C7E-AC71-FFC9D8740CD3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499n1a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1A1E1DE-1E91-41D7-A541-21A30D108079\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499n4a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"3ACE83CB-AAC3-4F43-A30A-407858781797\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499n4a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A987DA0E-073B-4907-8832-7922B90BC4E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499n5a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"BC5735F5-10DE-4484-A545-071AEA70BEF2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499n5a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37C04B05-096C-4164-A741-B7954A35B44C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499n6a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"0A70DC2A-A6FD-4EF9-A5B6-452EF394039C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499n6a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2679123F-6527-43A1-8F18-4C38583196A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q3a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"6966884D-3B7D-4681-817A-D7D88ABC7A6B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q3a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"602AB545-0362-4026-B50F-BCBDD6E0CD84\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q3e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"9F96C265-9DD7-464C-92B0-D66452C908F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q3e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE7147A8-07A7-4A12-A32C-9F78B4769FC3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q3f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"C8603BDB-2C73-486A-84B3-B8C8E23D4912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99124030-D2FF-4E2E-B9C8-149BE3632ADB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q4e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"3CD9E8F8-4E7F-4B17-88C1-22B7EC842F97\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q4e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B4FA2A6-78BF-48E8-8DC3-38AA4AB0B972\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q4f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"D931B48E-F670-4DCD-AFCD-2D57E7CF58C2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74B8BE15-E8FF-44AE-BE8E-B1942481E11D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q5a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"1A46136C-E0A8-4E84-BB87-66DE930314C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q5a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D85A76D-48F1-4987-9A70-ED5456B54470\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q5e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"D2CA0014-066E-4748-A852-2B830323C905\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q5e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFD000B-5695-478F-B753-5704C7429652\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q5f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"4856A54E-9F4C-4DEF-9F84-1A5CEF36A433\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q5f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C55A7BA8-F598-4880-B633-05A3FDACBF79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q5fr_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"1E65691B-DC5E-439E-AAE8-8DE8EA19997D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q5fr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"393EAC32-14A0-4DDD-84C8-020B56760D0A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q6a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"32807E0A-7910-477F-AF16-510389FB8C48\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q6a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67EF19BD-A57F-4DB7-B1D1-EBADD31A255F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q6e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"0BE85332-B117-441D-9676-2DD449A165F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q6e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"399F14B3-1359-4115-B64A-9267B24435BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q6f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"5AE552E9-8C0E-4E1F-9B28-A34CA9A53946\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q6f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F20D6044-770E-4A15-8772-3784DC1D1EF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q7a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"D313999A-5F50-499D-A3DA-2E3116A3EE27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q7a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A7D1CBE-1E9A-4267-A703-62A08D299162\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q7e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"5CD41288-E013-4C4E-91F3-934E9951D258\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q7e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0870AD27-C36D-4561-A288-D1F1ED1CC62A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q7f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"F20A11C7-A2D1-4DEB-AD06-9BFE89C626B5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q7f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF9DC45-E728-4FD1-B2F3-2E923D50B15B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q8a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"2FFF16BD-A1A4-416D-91B3-5032F0C685AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q8a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"619241C0-D505-479B-A31B-C778AE73A101\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q8e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"F47359EB-A1CF-4BAC-A624-50DACAA3315C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q8e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40FC1268-1FC6-4C99-A51F-A7AC11259FAD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q8f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"2F003C86-81E6-4B92-813F-764919FACC77\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q8f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94FC1BD2-2ACD-4B52-920D-F0C97C754D8F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:499q9a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.17.5.34-202412122146\",\"matchCriteriaId\":\"1FB61DA6-3506-452A-A62A-9267ACB6EDF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:499q9a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"449D6A0F-4B4D-438B-9F27-DDF601748F38\"}]}]}],\"references\":[{\"url\":\"https://support.hp.com/us-en/document/ish_11953771-11953793-16/hpsbpi04007\",\"source\":\"hp-security-alert@hp.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-26506\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-14T17:13:43.148071Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-14T17:23:06.369Z\"}}], \"cna\": {\"title\": \"Certain HP LaserJet Pro, HP LaserJet Enterprise, HP LaserJet Managed Printers \\u2013 Potential Remote Code Execution and Potential Elevation of Privilege\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 9.2, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"HP, Inc.\", \"product\": \"Certain HP LaserJet Pro, HP LaserJet Enterprise, HP LaserJet Managed Printers\", \"versions\": [{\"status\": \"affected\", \"version\": \"See HP security bulletin reference for affected versions\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://support.hp.com/us-en/document/ish_11953771-11953793-16/hpsbpi04007\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eCertain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job.\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-121\", \"description\": \"CWE-121\"}]}], \"providerMetadata\": {\"orgId\": \"74586083-13ce-40fd-b46a-8e5d23cfbcb2\", \"shortName\": \"hp\", \"dateUpdated\": \"2025-02-14T16:58:09.823Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-26506\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-14T17:23:15.086Z\", \"dateReserved\": \"2025-02-11T20:23:19.623Z\", \"assignerOrgId\": \"74586083-13ce-40fd-b46a-8e5d23cfbcb2\", \"datePublished\": \"2025-02-14T16:58:09.823Z\", \"assignerShortName\": \"hp\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…