CVE-2022-43780 (GCVE-0-2022-43780)
Vulnerability from cvelistv5 – Published: 2022-11-15 17:42 – Updated: 2025-04-30 15:53
VLAI?
Summary
Certain HP ENVY, OfficeJet, and DeskJet printers may be vulnerable to a Denial of Service attack.
Severity ?
7.5 (High)
CWE
- n/a
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Certain HP ENVY, OfficeJet, and DeskJet printers |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T13:40:06.282Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-43780",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-30T15:53:26.244228Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-30T15:53:32.082Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Certain HP ENVY, OfficeJet, and DeskJet printers",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain HP ENVY, OfficeJet, and DeskJet printers may be vulnerable to a Denial of Service attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-12T12:11:04.548Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813"
}
],
"x_generator": {
"engine": "cveClient/1.0.13"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2022-43780",
"datePublished": "2022-11-15T17:42:54.646Z",
"dateReserved": "2022-10-26T14:39:32.657Z",
"dateUpdated": "2025-04-30T15:53:32.082Z",
"requesterUserId": "9a761dcf-561b-4659-bf42-294748601a28",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u75a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"DDD773D3-6C73-4947-9A59-AD6D09F7C72A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u75a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F39C8823-0312-485E-A061-2546E28C5CF8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u76a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"D7764EBB-7A08-411F-8BF7-4846B2ED3262\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u76a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F6F38A6-1D7D-45AF-9DD8-C78841E60EE1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u77a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"20D75579-AB2C-47C6-8947-8EF9CA8CC1EC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u77a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28A02BAB-4D7B-4336-AC3C-97CE2F12F856\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u81a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"9467FEC6-614F-4C47-810B-98331D37477A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u81a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54E31973-1A54-489B-A673-C9308507729E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u81b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"1CD21651-A4C8-4551-8AA7-70AA3F917BE3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u81b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4004CBA-77C1-4E03-A677-0C7CBEEF5F48\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u82a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"B03516E3-6DAF-422C-A1AA-F184DA2E9D1D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u82a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"064A193C-80F8-4F9F-8F02-9CDC129164E9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u82b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"E2491F8D-41DE-4812-AB07-997155DD90C5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u82b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F7B10E4-83E1-4DF9-9FB9-EC5F54284279\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u84a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"938031A9-D94B-44D4-B3DA-A291CC99F729\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u84a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD6B15D7-87CF-469A-B3CF-CDD1C1AB9680\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u84b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"63B71122-F3A8-4E34-AA36-647E97EF2489\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u84b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A33D9D74-624A-4FF0-BE4F-46A2C9A8EADF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u85a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"6733B27E-12F5-4703-BBF9-CC8D6E9C3558\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u85a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12B7A9C4-7E53-40A8-BADC-61E87AC810C4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u85b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"EF22FE5E-363A-41A8-A604-311119B6B084\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u85b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31A0BE2F-1311-4557-9F31-1FE67D8E4AD0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u86a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"F7F632F2-F780-4A16-BCDB-ACE020232641\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u86a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E36A392-DED5-479A-A8D2-7C2A7F60D8F3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u86b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"30BA5BED-F7DB-4278-B3E0-9B82B4AAC524\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u86b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C025757-5381-4983-9F6C-975CB3B8B18F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u86c_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"EEF53D16-BBE2-438A-959C-EBAB6CC22533\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u86c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92A5533F-5B58-4DF2-B52F-196669209F0F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u87a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"075C551A-F8C2-48B5-BCF9-0E808CC1D9B1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u87a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7F96555-E2D0-4FAC-9F31-6A06752ED150\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u87b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"D309819B-663B-4B4D-AF5B-45CF17B415B2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u87b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A43B768-1523-44BE-ACA2-4C709163D1FD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u88b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"E11B9E50-5548-4FA2-A9A4-9CEB4B74C24F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u88b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7EF7256-F0A3-4D2F-8D92-D5014DBF8D95\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u89b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"9E73139F-29A7-4096-971A-34078654B644\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u89b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D2E34D5-B4DF-4EB7-BCAE-73688E4DE3AB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u91a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"FA4BA9F4-B7DA-4C97-A978-A2E229C2CD2A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u91a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC1C60CF-F05B-4B83-8F8E-A95DE1F78729\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u91b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"180B8701-1BA4-47FA-8588-595C6EA20D6A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u91b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3F42463-735F-4968-A867-93EFEE272F63\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u92a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"1005D40E-2CB3-4553-8C11-57C27349A8CC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u92a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D87589A-6BDB-4857-BEE0-AC0F703C39CD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u92b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"B84F1EAA-4270-498D-A0F6-9FCFEB99B261\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u92b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6DF09B2-585A-492E-8609-736EDE471D90\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u94a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"BDC93470-9D6E-4BB1-8F5F-C79DC979EA13\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u94a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A20151D-0532-40BC-81D1-1AE9A76E3DE4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:m2u94b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"2D2D4978-BC2A-445B-BBDE-BB638E862260\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:m2u94b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"812CCCFA-77C0-4A00-B85D-02E5DA2807E3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4a54a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"30E5FB33-FFCA-4EA6-B8E7-941B0CFAA10F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4a54a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0753EE8-5937-4304-96A7-6807A948FBE9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4a59a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"72FAA176-3162-4262-AE59-2854BD3A67CF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4a59a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E982A33-3344-47CE-8D42-F742B41E691D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4a60a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"F29079A5-06CE-4217-B858-FA5B757320F7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4a60a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1235C9D8-1DBE-463B-A359-DAC30624DA7F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4a61a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"60449328-A25C-4C07-BE54-6430C6D1611A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4a61a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAA1836B-6724-4783-985A-003E46F90890\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4a61b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"E64522FE-6E3C-4999-A284-A46C51680C07\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4a61b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B073F3BD-5ED0-420E-BEB4-D99134BB8E9D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4a69a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"F6A740FC-DD2A-4BEC-8051-F71012D04ED9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4a69a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C309039-528E-43FB-B45A-6E387097F753\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4a70a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"796A7055-202E-430A-AAEA-5A6869799B0D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4a70a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DD72D0A-0842-4D16-A907-5147F1C5C369\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4a71a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"4D92D8EA-FFFC-419A-84AE-163ECDFCA143\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4a71a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D28CAB47-6D5C-452B-A3B7-0C427D8D2BF0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4a73a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"23AF8591-2BCA-4312-8FC2-4C182BA3E1FA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4a73a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BED506F2-9512-47D5-B59E-153F184350F9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4a74a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"39504855-F6B9-4034-B9B6-D1D51B32DBA8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4a74a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"221A72D5-9C6D-4038-89CF-C0FD3BF3C585\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4b12a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"F3DB6723-19E6-4D7A-A137-F9C6E217DC38\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4b12a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4855BC29-F2D8-42F8-B3D0-71752055BED5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4b13a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"7134ECAB-80EE-4285-B6F7-96DB1EBC0217\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4b13a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B2DA4FF-2187-426E-BC74-D7DEBCDEFD48\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4b14a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"5CBC6E92-0AAA-41B0-82AE-3A80AC684D67\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4b14a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43385589-C6FE-45A9-916D-4C25A9189874\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4b18a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"B4CB24A6-9925-4C1C-AE11-3F03142AC66D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4b18a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"466BCAF3-0FE4-4E70-BCA7-DAE8C581CBC8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4b27a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"7697583D-B42D-4A78-BD8E-6F6A1E1D52D3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4b27a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9C389D7-24BA-4D78-ACDC-F2BE719F2D3A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4b28a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"DBB9CC23-9B67-4585-A795-46A12339E3B6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4b28a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D327035-BE36-4C7D-95F8-51D90B38DBF1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:z4b29a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"003.2237a\", \"matchCriteriaId\": \"A785FBA9-A7B4-41F3-A3A3-0B8FF5B493FC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:z4b29a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A1590D2-8F99-4AED-A947-6C18D105D055\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Certain HP ENVY, OfficeJet, and DeskJet printers may be vulnerable to a Denial of Service attack.\"}, {\"lang\": \"es\", \"value\": \"Ciertas impresoras HP ENVY, OfficeJet y DeskJet pueden ser vulnerables a un ataque de Denegaci\\u00f3n de Servicio (DoS).\"}]",
"id": "CVE-2022-43780",
"lastModified": "2024-11-21T07:27:14.360",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2022-12-12T13:15:15.037",
"references": "[{\"url\": \"https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813\", \"source\": \"hp-security-alert@hp.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "hp-security-alert@hp.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-43780\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2022-12-12T13:15:15.037\",\"lastModified\":\"2025-04-30T16:15:29.720\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain HP ENVY, OfficeJet, and DeskJet printers may be vulnerable to a Denial of Service attack.\"},{\"lang\":\"es\",\"value\":\"Ciertas impresoras HP ENVY, OfficeJet y DeskJet pueden ser vulnerables a un ataque de Denegaci\u00f3n de Servicio (DoS).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u75a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"DDD773D3-6C73-4947-9A59-AD6D09F7C72A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u75a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F39C8823-0312-485E-A061-2546E28C5CF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u76a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"D7764EBB-7A08-411F-8BF7-4846B2ED3262\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u76a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F6F38A6-1D7D-45AF-9DD8-C78841E60EE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u77a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"20D75579-AB2C-47C6-8947-8EF9CA8CC1EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u77a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A02BAB-4D7B-4336-AC3C-97CE2F12F856\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u81a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"9467FEC6-614F-4C47-810B-98331D37477A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u81a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54E31973-1A54-489B-A673-C9308507729E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u81b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"1CD21651-A4C8-4551-8AA7-70AA3F917BE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u81b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4004CBA-77C1-4E03-A677-0C7CBEEF5F48\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u82a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"B03516E3-6DAF-422C-A1AA-F184DA2E9D1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u82a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"064A193C-80F8-4F9F-8F02-9CDC129164E9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u82b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"E2491F8D-41DE-4812-AB07-997155DD90C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u82b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F7B10E4-83E1-4DF9-9FB9-EC5F54284279\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u84a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"938031A9-D94B-44D4-B3DA-A291CC99F729\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u84a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6B15D7-87CF-469A-B3CF-CDD1C1AB9680\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u84b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"63B71122-F3A8-4E34-AA36-647E97EF2489\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u84b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A33D9D74-624A-4FF0-BE4F-46A2C9A8EADF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u85a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"6733B27E-12F5-4703-BBF9-CC8D6E9C3558\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u85a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12B7A9C4-7E53-40A8-BADC-61E87AC810C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u85b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"EF22FE5E-363A-41A8-A604-311119B6B084\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u85b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31A0BE2F-1311-4557-9F31-1FE67D8E4AD0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u86a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"F7F632F2-F780-4A16-BCDB-ACE020232641\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u86a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E36A392-DED5-479A-A8D2-7C2A7F60D8F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u86b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"30BA5BED-F7DB-4278-B3E0-9B82B4AAC524\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u86b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C025757-5381-4983-9F6C-975CB3B8B18F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u86c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"EEF53D16-BBE2-438A-959C-EBAB6CC22533\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u86c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92A5533F-5B58-4DF2-B52F-196669209F0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u87a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"075C551A-F8C2-48B5-BCF9-0E808CC1D9B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u87a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7F96555-E2D0-4FAC-9F31-6A06752ED150\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u87b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"D309819B-663B-4B4D-AF5B-45CF17B415B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u87b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A43B768-1523-44BE-ACA2-4C709163D1FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u88b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"E11B9E50-5548-4FA2-A9A4-9CEB4B74C24F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u88b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7EF7256-F0A3-4D2F-8D92-D5014DBF8D95\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u89b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"9E73139F-29A7-4096-971A-34078654B644\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u89b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D2E34D5-B4DF-4EB7-BCAE-73688E4DE3AB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u91a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"FA4BA9F4-B7DA-4C97-A978-A2E229C2CD2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u91a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC1C60CF-F05B-4B83-8F8E-A95DE1F78729\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u91b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"180B8701-1BA4-47FA-8588-595C6EA20D6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u91b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3F42463-735F-4968-A867-93EFEE272F63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u92a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"1005D40E-2CB3-4553-8C11-57C27349A8CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u92a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D87589A-6BDB-4857-BEE0-AC0F703C39CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u92b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"B84F1EAA-4270-498D-A0F6-9FCFEB99B261\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u92b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6DF09B2-585A-492E-8609-736EDE471D90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u94a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"BDC93470-9D6E-4BB1-8F5F-C79DC979EA13\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u94a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A20151D-0532-40BC-81D1-1AE9A76E3DE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:m2u94b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"2D2D4978-BC2A-445B-BBDE-BB638E862260\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:m2u94b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"812CCCFA-77C0-4A00-B85D-02E5DA2807E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a54a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"30E5FB33-FFCA-4EA6-B8E7-941B0CFAA10F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a54a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0753EE8-5937-4304-96A7-6807A948FBE9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a59a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"72FAA176-3162-4262-AE59-2854BD3A67CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a59a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E982A33-3344-47CE-8D42-F742B41E691D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a60a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"F29079A5-06CE-4217-B858-FA5B757320F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a60a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1235C9D8-1DBE-463B-A359-DAC30624DA7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a61a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"60449328-A25C-4C07-BE54-6430C6D1611A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a61a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAA1836B-6724-4783-985A-003E46F90890\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a61b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"E64522FE-6E3C-4999-A284-A46C51680C07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a61b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B073F3BD-5ED0-420E-BEB4-D99134BB8E9D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a69a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"F6A740FC-DD2A-4BEC-8051-F71012D04ED9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a69a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C309039-528E-43FB-B45A-6E387097F753\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a70a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"796A7055-202E-430A-AAEA-5A6869799B0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a70a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DD72D0A-0842-4D16-A907-5147F1C5C369\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a71a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"4D92D8EA-FFFC-419A-84AE-163ECDFCA143\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a71a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28CAB47-6D5C-452B-A3B7-0C427D8D2BF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a73a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"23AF8591-2BCA-4312-8FC2-4C182BA3E1FA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a73a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED506F2-9512-47D5-B59E-153F184350F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4a74a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"39504855-F6B9-4034-B9B6-D1D51B32DBA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4a74a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"221A72D5-9C6D-4038-89CF-C0FD3BF3C585\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b12a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"F3DB6723-19E6-4D7A-A137-F9C6E217DC38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b12a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4855BC29-F2D8-42F8-B3D0-71752055BED5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b13a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"7134ECAB-80EE-4285-B6F7-96DB1EBC0217\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b13a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B2DA4FF-2187-426E-BC74-D7DEBCDEFD48\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b14a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"5CBC6E92-0AAA-41B0-82AE-3A80AC684D67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b14a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43385589-C6FE-45A9-916D-4C25A9189874\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b18a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"B4CB24A6-9925-4C1C-AE11-3F03142AC66D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b18a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"466BCAF3-0FE4-4E70-BCA7-DAE8C581CBC8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b27a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"7697583D-B42D-4A78-BD8E-6F6A1E1D52D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b27a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9C389D7-24BA-4D78-ACDC-F2BE719F2D3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b28a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"DBB9CC23-9B67-4585-A795-46A12339E3B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b28a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D327035-BE36-4C7D-95F8-51D90B38DBF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4b29a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"003.2237a\",\"matchCriteriaId\":\"A785FBA9-A7B4-41F3-A3A3-0B8FF5B493FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4b29a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A1590D2-8F99-4AED-A947-6C18D105D055\"}]}]}],\"references\":[{\"url\":\"https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813\",\"source\":\"hp-security-alert@hp.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:40:06.282Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-43780\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-30T15:53:26.244228Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-30T15:53:17.380Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"HP Inc.\", \"product\": \"Certain HP ENVY, OfficeJet, and DeskJet printers\", \"versions\": [{\"status\": \"affected\", \"version\": \"See HP Security Bulletin reference for affected versions.\"}]}], \"references\": [{\"url\": \"https://support.hp.com/us-en/document/ish_7095452-7095489-16/hpsbpi03813\"}], \"x_generator\": {\"engine\": \"cveClient/1.0.13\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Certain HP ENVY, OfficeJet, and DeskJet printers may be vulnerable to a Denial of Service attack.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"74586083-13ce-40fd-b46a-8e5d23cfbcb2\", \"shortName\": \"hp\", \"dateUpdated\": \"2022-12-12T12:11:04.548Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-43780\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-30T15:53:32.082Z\", \"dateReserved\": \"2022-10-26T14:39:32.657Z\", \"assignerOrgId\": \"74586083-13ce-40fd-b46a-8e5d23cfbcb2\", \"datePublished\": \"2022-11-15T17:42:54.646Z\", \"requesterUserId\": \"9a761dcf-561b-4659-bf42-294748601a28\", \"assignerShortName\": \"hp\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…