FKIE_CVE-2025-43018
Vulnerability from fkie_nvd - Published: 2025-07-30 15:15 - Updated: 2026-02-24 14:37
Severity ?
Summary
Certain HP LaserJet Pro printers may be vulnerable to information disclosure when a non-authenticated user queries a device’s local address book.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| hp | w1a75a_firmware | * | |
| hp | w1a75a | - | |
| hp | w1a76a_firmware | * | |
| hp | w1a76a | - | |
| hp | w1a77a_firmware | * | |
| hp | w1a77a | - | |
| hp | w1a81a_firmware | * | |
| hp | w1a81a | - | |
| hp | w1a82a_firmware | * | |
| hp | w1a82a | - | |
| hp | w1a79a_firmware | * | |
| hp | w1a79a | - | |
| hp | w1a80a_firmware | * | |
| hp | w1a80a | - | |
| hp | w1a78a_firmware | * | |
| hp | w1a78a | - | |
| hp | w1a29a_firmware | * | |
| hp | w1a29a | - | |
| hp | w1a32a_firmware | * | |
| hp | w1a32a | - | |
| hp | w1a30a_firmware | * | |
| hp | w1a30a | - | |
| hp | w1a38a_firmware | * | |
| hp | w1a38a | - | |
| hp | w1a34a_firmware | * | |
| hp | w1a34a | - | |
| hp | w1a35a_firmware | * | |
| hp | w1a35a | - | |
| hp | w1a28a_firmware | * | |
| hp | w1a28a | - | |
| hp | w1a31a_firmware | * | |
| hp | w1a31a | - | |
| hp | w1a33a_firmware | * | |
| hp | w1a33a | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a75a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB2A934-BC96-46A1-8A0A-D52EB21C89EE",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a75a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FBE9436-340F-4428-91CB-4F53764AC184",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a76a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50415176-0CFE-4F02-BF62-75FE370E014A",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a76a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C84C74A6-597E-4E0A-93AC-94EF3073321E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a77a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35BDFD18-84AF-4425-8D98-79C171289E4A",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a77a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76B034FA-D338-40CD-917E-7B8177715FCB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a81a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02C48F25-C9CD-4122-B9D3-3D5AD94B0A84",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a81a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF8D6946-CE0F-45AE-BBA9-5983F860FEDD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a82a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "581165CB-294D-4E27-9E34-B3D758F22570",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a82a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E35167E-1A40-4A62-931B-6AF8F49C2214",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a79a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCB1C96B-8A47-46DF-A55C-E1434E455323",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a79a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81B33E5A-E22E-4DCF-9B8E-F0650CBF6309",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a80a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34BCAF85-B1E0-4358-9E08-27E74F5F57C2",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a80a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E611AC6F-F279-427F-8213-1B3A1F0EB63B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a78a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3023286-FF72-4D2B-8156-9276A834C3A9",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a78a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A103FF3D-FB16-463F-9913-49EEDCDB9348",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a29a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A879881-7FF2-440B-800A-029A5CBE37B0",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a29a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9624B6BE-5156-4132-ABBE-81466E4F64A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a32a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E2DC587-C6F4-4486-A756-BC41229F9F67",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a32a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4B304BF-F764-4F14-BD76-6A6DF8518C25",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a30a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B354259-A6F7-4E31-A0F3-B6338B3E4A13",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a30a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A2CE24-D521-419D-8FB0-CEC3FC6D92AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a38a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "946C43A8-86F7-4097-A283-F00764E1CF52",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a38a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "451CC589-DCA9-41E1-B2DD-D5763CCC77B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a34a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10BF12E6-98C1-4B82-A948-E4BC8684850A",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a34a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D81DC5BF-E5DD-4D3C-9C54-515C8880F6E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a35a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DBC9F3-2395-4517-B461-DE6961534D74",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a35a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2866A92-E6B1-4951-B7F7-69EACBA320C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a28a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3189EA8F-0076-446C-9DF5-0CB951A6CF9D",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a28a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "801FA1FF-4649-4A65-8105-36576ED5D6F6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a31a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "715ABB83-3D9E-4E77-A4D7-C132F3741064",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a31a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0601A79A-B200-4137-BCB9-BC17F02E615A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:w1a33a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3D8BCC-FC1F-4266-ABDA-9BBD40BB8F7C",
"versionEndExcluding": "002.2508a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:w1a33a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD396D17-8CED-445C-AEA9-9C4E3C6ADE19",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain HP LaserJet Pro printers may be vulnerable to information disclosure when a non-authenticated user queries a device\u2019s local address book."
},
{
"lang": "es",
"value": "Algunas impresoras HP LaserJet Pro pueden ser vulnerables a la divulgaci\u00f3n de informaci\u00f3n cuando un usuario no autenticado consulta la libreta de direcciones local de un dispositivo."
}
],
"id": "CVE-2025-43018",
"lastModified": "2026-02-24T14:37:20.720",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "hp-security-alert@hp.com",
"type": "Secondary"
}
]
},
"published": "2025-07-30T15:15:33.010",
"references": [
{
"source": "hp-security-alert@hp.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.hp.com/us-en/document/ish_12807011-12807034-16/hpsbpi04040"
}
],
"sourceIdentifier": "hp-security-alert@hp.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "hp-security-alert@hp.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…