cve-2022-2794
Vulnerability from cvelistv5
Published
2022-11-18 20:48
Modified
2024-08-03 00:46
Severity ?
EPSS score ?
Summary
Certain HP PageWide Pro Printers may be vulnerable to a potential denial of service attack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | HP Inc. | Certain HP PageWide Pro printers |
Version: See HP Security Bulletin reference for affected versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:46:04.581Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.hp.com/us-en/document/ish_6720386-6720411-16/hpsbpi03807" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Certain HP PageWide Pro printers", "vendor": "HP Inc.", "versions": [ { "status": "affected", "version": "See HP Security Bulletin reference for affected versions." } ] } ], "descriptions": [ { "lang": "en", "value": "Certain HP PageWide Pro Printers may be vulnerable to a potential denial of service attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-12T12:11:04.548862Z", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "url": "https://support.hp.com/us-en/document/ish_6720386-6720411-16/hpsbpi03807" } ], "x_generator": { "engine": "cveClient/1.0.13" } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2022-2794", "datePublished": "2022-11-18T20:48:49.100Z", "dateReserved": "2022-08-11T21:47:47.246Z", "dateUpdated": "2024-08-03T00:46:04.581Z", "requesterUserId": "e0158710-d811-4b94-9318-6cef34bebe03", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_352dw_j6u57a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"3F94A003-9E8C-4F37-9F5E-8E89C4918BCC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_352dw_j6u57a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B196E260-88F9-4E95-A88B-87B9F37765E8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_377dw_j9v80a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"2428B078-5082-409D-8DA0-052C724C86EB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_377dw_j9v80a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87EFE8B9-57A8-43CA-B0D7-FC833C45DF44\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_managed_p55250dw_j6u55a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"3B8D1A3C-EECE-4C0E-805A-BD0A7B44F87B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_managed_p55250dw_j6u55a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F01DF42-E865-4257-9367-4693DBDAE928\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_managed_p55250dw_j6u51b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"14D34AC7-E222-44A5-B72B-7ABB61C09E08\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_managed_p55250dw_j6u51b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59456D7A-A466-4B99-B7C4-609B29C86D5D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_managed_p55250dw_j6u55b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"A92CBE6E-2C3A-452C-B164-159ACCE9BAAE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_managed_p55250dw_j6u55b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CCBFF3A-089D-46DA-9A7B-C20AF1C29EEC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_managed_p57750dw_j9v82a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"CB74A9C5-0CA7-40A6-BEDA-3EB37065FFC3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_managed_p57750dw_j9v82a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D79C449-9336-4C19-BF9F-6BD3580BC47D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_pro_452dn_d3q15a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"4C719D50-8290-4135-BA81-F3500B9A7B55\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_pro_452dn_d3q15a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9EA6B91-B74C-41FD-8F02-DBE79F15CE39\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_pro_452dw_d3q16a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"5D595182-7485-411A-98EA-52EAEEDFDD26\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_pro_452dw_d3q16a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AA4BB73-0430-4B40-82B0-5FE18AC2A27B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_pro_477dn_d3q19a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"71D0983E-7A90-4897-BD72-CCABBFC69B2E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_pro_477dn_d3q19a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50A3551F-66A3-4C8E-8117-9DB0144D8A90\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_pro_477dw_d3q20a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"49169A6F-86A3-4DDA-8AC1-E084B5DC514B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_pro_477dw_d3q20a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C34D8DD-75F3-41A7-944E-6C729DC737C6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_pro_552dw_d3q17a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"8F05F5FA-F795-4268-B5E6-34E124BE0FA5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_pro_552dw_d3q17a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C051C3D2-1F2A-4E92-BF3F-6BCAB518F071\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_pro_577dw_d3q21a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"FE3D3D7C-0640-451E-88C3-F029CE58A460\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_pro_577dw_d3q21a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D58F934-510A-4249-B92A-ED788766AE44\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:pagewide_pro_577z_k9z76a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2228b\", \"matchCriteriaId\": \"BFD4F286-7B83-4D20-BFF4-8E2A953D7F9A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:pagewide_pro_577z_k9z76a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C43C66E-64AC-444B-A1B1-62EB8A3D6FE1\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Certain HP PageWide Pro Printers may be vulnerable to a potential denial of service attack.\"}, {\"lang\": \"es\", \"value\": \"Ciertas impresoras HP PageWide Pro pueden ser vulnerables a un posible ataque de Denegaci\\u00f3n de Servicio (DoS).\"}]", "id": "CVE-2022-2794", "lastModified": "2024-11-21T07:01:42.430", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}", "published": "2022-12-12T13:15:12.210", "references": "[{\"url\": \"https://support.hp.com/us-en/document/ish_6720386-6720411-16/hpsbpi03807\", \"source\": \"hp-security-alert@hp.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.hp.com/us-en/document/ish_6720386-6720411-16/hpsbpi03807\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "hp-security-alert@hp.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2022-2794\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2022-12-12T13:15:12.210\",\"lastModified\":\"2024-11-21T07:01:42.430\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain HP PageWide Pro Printers may be vulnerable to a potential denial of service attack.\"},{\"lang\":\"es\",\"value\":\"Ciertas impresoras HP PageWide Pro pueden ser vulnerables a un posible ataque de Denegaci\u00f3n de Servicio (DoS).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_352dw_j6u57a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"3F94A003-9E8C-4F37-9F5E-8E89C4918BCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_352dw_j6u57a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B196E260-88F9-4E95-A88B-87B9F37765E8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_377dw_j9v80a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"2428B078-5082-409D-8DA0-052C724C86EB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_377dw_j9v80a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87EFE8B9-57A8-43CA-B0D7-FC833C45DF44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_managed_p55250dw_j6u55a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"3B8D1A3C-EECE-4C0E-805A-BD0A7B44F87B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_managed_p55250dw_j6u55a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F01DF42-E865-4257-9367-4693DBDAE928\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_managed_p55250dw_j6u51b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"14D34AC7-E222-44A5-B72B-7ABB61C09E08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_managed_p55250dw_j6u51b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59456D7A-A466-4B99-B7C4-609B29C86D5D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_managed_p55250dw_j6u55b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"A92CBE6E-2C3A-452C-B164-159ACCE9BAAE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_managed_p55250dw_j6u55b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CCBFF3A-089D-46DA-9A7B-C20AF1C29EEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_managed_p57750dw_j9v82a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"CB74A9C5-0CA7-40A6-BEDA-3EB37065FFC3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_managed_p57750dw_j9v82a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D79C449-9336-4C19-BF9F-6BD3580BC47D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_pro_452dn_d3q15a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"4C719D50-8290-4135-BA81-F3500B9A7B55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_pro_452dn_d3q15a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9EA6B91-B74C-41FD-8F02-DBE79F15CE39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_pro_452dw_d3q16a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"5D595182-7485-411A-98EA-52EAEEDFDD26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_pro_452dw_d3q16a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AA4BB73-0430-4B40-82B0-5FE18AC2A27B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_pro_477dn_d3q19a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"71D0983E-7A90-4897-BD72-CCABBFC69B2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_pro_477dn_d3q19a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50A3551F-66A3-4C8E-8117-9DB0144D8A90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_pro_477dw_d3q20a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"49169A6F-86A3-4DDA-8AC1-E084B5DC514B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_pro_477dw_d3q20a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C34D8DD-75F3-41A7-944E-6C729DC737C6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_pro_552dw_d3q17a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"8F05F5FA-F795-4268-B5E6-34E124BE0FA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_pro_552dw_d3q17a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C051C3D2-1F2A-4E92-BF3F-6BCAB518F071\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_pro_577dw_d3q21a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"FE3D3D7C-0640-451E-88C3-F029CE58A460\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_pro_577dw_d3q21a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D58F934-510A-4249-B92A-ED788766AE44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:pagewide_pro_577z_k9z76a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2228b\",\"matchCriteriaId\":\"BFD4F286-7B83-4D20-BFF4-8E2A953D7F9A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:pagewide_pro_577z_k9z76a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C43C66E-64AC-444B-A1B1-62EB8A3D6FE1\"}]}]}],\"references\":[{\"url\":\"https://support.hp.com/us-en/document/ish_6720386-6720411-16/hpsbpi03807\",\"source\":\"hp-security-alert@hp.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.hp.com/us-en/document/ish_6720386-6720411-16/hpsbpi03807\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.