VAR-201603-0041
Vulnerability from variot - Updated: 2023-12-18 12:37HP LaserJet printers and MFPs and OfficeJet Enterprise printers with firmware before 3.7.01 allow remote attackers to obtain sensitive information via unspecified vectors. HP LaserJetPrinters, HP LaserJetMFP and HPOfficeJetEnterprisePrinters are all printer products developed by Hewlett-Packard (HP). Security flaws exist in several HP products. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Note: the current version of the following document is available here: https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05030353
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05030353 Version: 1
HPSBPI03546 rev.1 - HP LaserJet Printers and MFPs, HP OfficeJet Enterprise Printers, Remote Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
References:
- CVE-2016-2244 (PSR-2016-0021)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Please refer to the RESOLUTION below for a list of impacted products.
BACKGROUND
For a PGP signed version of this security bulletin please write to: security-alert@hp.com
CVSS 2.0 Base Metrics
Reference Base Vector Base Score
CVE-2016-2244 (PSR-2016-0021) (AV:N/AC:L/Au:N/C:N/I:C/A:N) 7.8
RESOLUTION
HP has provided firmware updates for impacted printers as listed in the table below. To obtain the updated firmware, go to www.hp.com and follow these steps:
-
Under support, select "Download Drivers".
-
Enter the appropriate product name listed in the table below into the search field.
-
Click on "Find my product".
-
Click on the appropriate product.
-
Under "Operating Systems" select the applicable operating system from the list.
-
Select the appropriate firmware update under "Firmware", click "Download".
Firmware Updates Table
Affect Product (Model Affected Affected Resolution Firmware Numbers) Firmware Firmware Version (Bundle) Bundle Version
HP Color LaserJet 3.6.3 2307497_543950 Enterprise M651 3.6.4 2307619_547160 2307851_000048 (CZ255A, CZ256A, CZ257A, 3.7 2307781_551200 (3.7.01) CZ258A) 3.7.1 2307884_553037 3.7.2 2307939_554654
3.6.3 2307497_543953
HP Color LaserJet 3.6.4 2307619_547145 2307851_000051 Enterprise M750 3.7 2307781_551203 (3.7.01) (D3L08A, D3L09A, D3L10A) 3.7.1 2307884_553040 3.7.2 2307939_554657
3.6.3 2307497_543947
HP Color LaserJet M680 3.6.4 2307619_547157 2307851_000059 (CZ249A, CZ250A, CA251A) 3.7 2307781_551196 (3.7.01) 3.7.1 2307884_553034 3.7.2 2307939_554651
3.6.3 2307497_543957
HP LaserJet Enterprise 500 3.6.4 2307619_547167 2307851_000056 color MFP M575dn 3.7 2307781_551207 (3.7.01) (CD644A, CD645A) 3.7.1 2307884_553044 3.7.2 2307939_554662
3.6.3 2307497_543945
HP LaserJet Enterprise 500 3.6.4 2307619_547155 2307851_000043 MFP M525f 3.7 2307781_551195 (3.7.01) (CF116A, CF117A) 3.7.1 2307884_553032 3.7.2 2307939_554649
3.6.3 2307497_543961
HP LaserJet Enterprise 600 3.6.4 2307619_547168 2307851_000040 M601 3.7 2307781_551208 (3.7.01) (CE989A, CE990A) 3.7.1 2307884_553045 3.7.2 2307939_554664
3.6.3 2307497_543961
HP LaserJet Enterprise 600 3.6.4 2307619_547168 2307851_000040 M602 3.7 2307781_551208 (3.7.01) (CE991A, CE992A, CE993A) 3.7.1 2307884_553045 3.7.2 2307939_554664
3.6.3 2307497_543961
HP LaserJet Enterprise 600 3.6.4 2307619_547168 2307851_000040 M603xh 3.7 2307781_551208 (3.7.01) (CE994A, CE995A, CE996A) 3.7.1 2307884_553045 3.7.2 2307939_554664
3.6.3 2307497_543958
HP LaserJet Enterprise 700 3.6.4 2307619_547166 2307851_000055 color MFP M775 series 3.7 2307781_551206 (3.7.01) (CC522A, CC523A, CC524A) 3.7.1 2307884_553043 3.7.2 2307939_554660
3.6.3 2307497_543955
HP LaserJet Enterprise 700 3.6.4 2307619_547165 2307851_000053 M712xh 3.7 2307781_551205 (3.7.01) (CF235A, CF236A, CF238A) 3.7.1 2307884_553042 3.7.2 2307939_554659
3.6.3 2307497_543951
HP LaserJet Enterprise 800 3.6.4 2307619_547161 2307851_000049 color M855 3.7 2307781_551201 (3.7.01) (A2W77A, A2W78A, A2W79A) 3.7.1 2307884_553038 3.7.2 2307939_554655
HP LaserJet Enterprise 800 3.6.3 2307497_543946 color MFP M880 3.6.4 2307619_547156 2307851_000058 (A2W76A, A2W75A, D7P70A, 3.7 2307781_551196 (3.7.01) D7P71A) 3.7.1 2307884_553033 3.7.2 2307939_554650
3.6.3 2307497_543964
HP LaserJet Enterprise 3.6.4 2307619_547169 2307851_000057 Color 500 M551 Series 3.7 2307781_551209 (3.7.01) (CF081A,CF082A,CF083A) 3.7.1 2307884_553046 3.7.2 2307939_554665
3.6.3 2307497_543957
HP LaserJet Enterprise 3.6.4 2307619_547167 2307851_000056 Color flow MFP M575c 3.7 2307781_551207 (3.7.01) (CD646A) 3.7.1 2307884_553044 3.7.2 2307939_554662
3.6.3 2307497_543948
HP LaserJet Enterprise 3.6.4 2307619_547158 2307851_000046 flow M830z MFP 3.7 2307781_551198 (3.7.01) (CF367A) 3.7.1 2307884_553035 3.7.2 2307939_554652
3.6.3 2307497_543945
HP LaserJet Enterprise 3.6.4 2307619_547155 2307851_000043 flow MFP M525c 3.7 2307781_551195 (3.7.01) (CF118A) 3.7.1 2307884_553032 3.7.2 2307939_554649
3.6.3 2307497_543943
HP LaserJet Enterprise 3.6.4 2307619_547153 2307851_000041 Flow MFP M630z 3.7 2307781_551193 (3.7.01) (B3G85A) 3.7.1 2307884_553030 3.7.2 2307939_554647
3.6.3 2307497_543952
HP LaserJet Enterprise 3.6.4 2307619_547163 2307851_000035 M806 3.7 2307781_551202 (3.7.01) (CZ244A, CZ245A) 3.7.1 2307884_553039 3.7.2 2307939_554656
3.6.3 2307497_543943
HP LaserJet Enterprise MFP 3.6.4 2307619_547153 2307851_000041 M630 3.7 2307781_551193 (3.7.01) (J7X28A) 3.7.1 2307884_553030 3.7.2 2307939_554647
HP LaserJet Enterprise MFP 3.6.3 2307497_543954 M725 3.6.4 2307619_547164 2307851_000054 (CF066A, CF067A, CF068A, 3.7 2307781_551204 (3.7.01) CF069A) 3.7.1 2307884_553041 3.7.2 2307939_554658
3.6.3 2307497_543944
HP OfficeJet Enterprise 3.6.4 2307619_547154 2307851_000039 Color MFP X585 3.7 2307781_551194 (3.7.01) (B5L04A, B5L05A, B5L07A) 3.7.1 2307884_553031 3.7.2 2307939_554648
3.6.3 2307497_543949
HP OfficeJet Enterprise 3.6.4 2307619_547159 2307851_000047 Color X555 3.7 2307781_551199 (3.7.01) (C2S11A, C2S12A) 3.7.1 2307884_553036 3.7.2 2307939_554653
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
REVISION HISTORY
Version:1 (rev.1) ? 01 March 2016 Initial release
Copyright 2016 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCAAGBQJW2MrgAAoJEPRuzn0I+N3Z+uMQAJ3Z2s5H1BllX7uvcKCeqSfb Y4Lcbd1rWDJiBPaej2fRR97fxVLBO9QTZKEhghTcehpIBfIjLcSR2PxaT8z0RC5C y8lTUFkU4IXXgWd58Pk21jUsFAHuQHQSpSYBQx+7/8ekturguwxlMgxjIJkWWnpU 79pUMCzCR1Q9jLaDNv4hmHCGo42L7Qn/4Kr5PQxWZ19OzdBOtNA5Kk2/DsLR6Q6u tKuBwlh+QMW9rFRenAKrfkZfyA3AeyUy/i4YR2Ghww8GXJzDoyjfFQWzdWJhs9UL LYzymXnkNe74BhthPAkyCQqbunpXOstNWYpG36uSImrNvOs6sOMWUj5saiAT1Znv MLiUMCUXZkadGwavXdWtHBUR7aDARyOPxg6F31XzcgV6bqjKzSUAYGI3WYVf6Jk3 pXrmW49no3y1luXHz6MDlTBKL09aZu9kCOpT555kH1hOu+mAMs0UBY72kDUF3839 +Mcb1R71mYGYR93jAmAXvJ51J2axlN0J7FF7o4mxowfrXPFTapqQF8s90IOhDtLk CQlSCSAD+NV0edzPy0zT77whx8GFIn5+DyEQ9tLfUq9Dl/e4DZWEKya9Q2UfTobJ tFG8VHUsXmk29rFYWk4gViO8OITq8p5A3mjmQ1R4NbQ4KbJJolHoK1PO/7VLHY5W UaJxLGryGjM699Yk6htj =zguU -----END PGP SIGNATURE-----
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201603-0041",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "futuresmart",
"scope": "lte",
"trust": 1.0,
"vendor": "hp",
"version": "3.7"
},
{
"model": "a2w75a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "a2w76a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "a2w77a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "a2w78a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "a2w79a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "b3g85a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "b5l04a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "b5l05a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "b5l07a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "c2s11a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "c2s12a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "ca251a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cc522a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cc523a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cc524a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cd644a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cd645a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cd646a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "ce989a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "ce990a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "ce991a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "ce992a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "ce993a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "ce994a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "ce995a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "ce996a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf066a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf067a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf068a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf069a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf081a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf082a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf083a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf116a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf117a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf118a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf235a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf236a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf238a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cf367a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cz244a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cz245a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cz249a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cz250a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cz255a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cz256a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cz257a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "cz258a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "d3l08a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "d3l09a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "d3l10a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "d7p70a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "d7p71a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "hp future smart",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "3.7.01"
},
{
"model": "j7x28a",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "laserjet printers",
"scope": null,
"trust": 0.6,
"vendor": "hp",
"version": null
},
{
"model": "officejet enterprise printers",
"scope": "lt",
"trust": 0.6,
"vendor": "hp",
"version": "3.7.01"
},
{
"model": "cf066a",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": null
},
{
"model": "cf067a",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": null
},
{
"model": "cf068a",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": null
},
{
"model": "ce995a",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": null
},
{
"model": "cz245a",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": null
},
{
"model": "b3g85a",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": null
},
{
"model": "cz244a",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": null
},
{
"model": "cf367a",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": null
},
{
"model": "cf118a",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": null
},
{
"model": "j7x28a",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-01472"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001685"
},
{
"db": "NVD",
"id": "CVE-2016-2244"
},
{
"db": "CNNVD",
"id": "CNNVD-201603-032"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hp:c2s12a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:c2s11a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf066a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:j7x28a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf083a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf082a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:a2w77a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf238a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:ce995a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:ce994a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf116a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cd645a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cz258a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cz257a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:b5l04a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf069a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:b3g85a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf118a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:d7p70a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:a2w75a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:a2w76a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cc524a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cc523a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:ce991a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:ce990a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cz249a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:d3l10a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf068a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf067a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf367a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cd646a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:a2w79a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:a2w78a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cc522a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:ce996a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:ce989a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf117a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:d3l09a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:d3l08a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:b5l07a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:b5l05a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cz245a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cz244a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf081a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:d7p71a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf236a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cf235a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:ce993a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:ce992a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cd644a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:ca251a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cz250a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cz256a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:hp:cz255a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:futuresmart_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7",
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-2244"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "HP",
"sources": [
{
"db": "PACKETSTORM",
"id": "136086"
}
],
"trust": 0.1
},
"cve": "CVE-2016-2244",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": true,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2016-2244",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-01472",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-91063",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-2244",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2016-01472",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201603-032",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-91063",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2016-2244",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-01472"
},
{
"db": "VULHUB",
"id": "VHN-91063"
},
{
"db": "VULMON",
"id": "CVE-2016-2244"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001685"
},
{
"db": "NVD",
"id": "CVE-2016-2244"
},
{
"db": "CNNVD",
"id": "CNNVD-201603-032"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "HP LaserJet printers and MFPs and OfficeJet Enterprise printers with firmware before 3.7.01 allow remote attackers to obtain sensitive information via unspecified vectors. HP LaserJetPrinters, HP LaserJetMFP and HPOfficeJetEnterprisePrinters are all printer products developed by Hewlett-Packard (HP). Security flaws exist in several HP products. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05030353\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c05030353\nVersion: 1\n\nHPSBPI03546 rev.1 - HP LaserJet Printers and MFPs, HP OfficeJet Enterprise\nPrinters, Remote Disclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon\nas possible. \n\nReferences:\n\n * CVE-2016-2244 (PSR-2016-0021)\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nPlease refer to the RESOLUTION below for a list of impacted products. \n\nBACKGROUND\n\nFor a PGP signed version of this security bulletin please write to:\nsecurity-alert@hp.com\n\nCVSS 2.0 Base Metrics\n================================================================================\n Reference Base Vector Base Score\n\nCVE-2016-2244 (PSR-2016-0021) (AV:N/AC:L/Au:N/C:N/I:C/A:N) 7.8\n================================================================================\n\nRESOLUTION\n\nHP has provided firmware updates for impacted printers as listed in the table\nbelow. To obtain the updated firmware, go to www.hp.com and follow these steps:\n\n 1. Under support, select \"Download Drivers\". \n\n 2. Enter the appropriate product name listed in the table below into the\n search field. \n\n 3. Click on \"Find my product\". \n\n 4. Click on the appropriate product. \n\n 5. Under \"Operating Systems\" select the applicable operating system from the\n list. \n\n 6. Select the appropriate firmware update under \"Firmware\", click \"Download\". \n\nFirmware Updates Table\n\n Affect Product (Model Affected Affected Resolution Firmware\n Numbers) Firmware Firmware Version (Bundle)\n Bundle Version\n\nHP Color LaserJet 3.6.3 2307497_543950\nEnterprise M651 3.6.4 2307619_547160 2307851_000048\n(CZ255A, CZ256A, CZ257A, 3.7 2307781_551200 (3.7.01)\nCZ258A) 3.7.1 2307884_553037\n 3.7.2 2307939_554654\n\n 3.6.3 2307497_543953\nHP Color LaserJet 3.6.4 2307619_547145 2307851_000051\nEnterprise M750 3.7 2307781_551203 (3.7.01)\n(D3L08A, D3L09A, D3L10A) 3.7.1 2307884_553040\n 3.7.2 2307939_554657\n\n 3.6.3 2307497_543947\nHP Color LaserJet M680 3.6.4 2307619_547157 2307851_000059\n(CZ249A, CZ250A, CA251A) 3.7 2307781_551196 (3.7.01)\n 3.7.1 2307884_553034\n 3.7.2 2307939_554651\n\n 3.6.3 2307497_543957\nHP LaserJet Enterprise 500 3.6.4 2307619_547167 2307851_000056\ncolor MFP M575dn 3.7 2307781_551207 (3.7.01)\n(CD644A, CD645A) 3.7.1 2307884_553044\n 3.7.2 2307939_554662\n\n 3.6.3 2307497_543945\nHP LaserJet Enterprise 500 3.6.4 2307619_547155 2307851_000043\nMFP M525f 3.7 2307781_551195 (3.7.01)\n(CF116A, CF117A) 3.7.1 2307884_553032\n 3.7.2 2307939_554649\n\n 3.6.3 2307497_543961\nHP LaserJet Enterprise 600 3.6.4 2307619_547168 2307851_000040\nM601 3.7 2307781_551208 (3.7.01)\n(CE989A, CE990A) 3.7.1 2307884_553045\n 3.7.2 2307939_554664\n\n 3.6.3 2307497_543961\nHP LaserJet Enterprise 600 3.6.4 2307619_547168 2307851_000040\nM602 3.7 2307781_551208 (3.7.01)\n(CE991A, CE992A, CE993A) 3.7.1 2307884_553045\n 3.7.2 2307939_554664\n\n 3.6.3 2307497_543961\nHP LaserJet Enterprise 600 3.6.4 2307619_547168 2307851_000040\nM603xh 3.7 2307781_551208 (3.7.01)\n(CE994A, CE995A, CE996A) 3.7.1 2307884_553045\n 3.7.2 2307939_554664\n\n 3.6.3 2307497_543958\nHP LaserJet Enterprise 700 3.6.4 2307619_547166 2307851_000055\ncolor MFP M775 series 3.7 2307781_551206 (3.7.01)\n(CC522A, CC523A, CC524A) 3.7.1 2307884_553043\n 3.7.2 2307939_554660\n\n 3.6.3 2307497_543955\nHP LaserJet Enterprise 700 3.6.4 2307619_547165 2307851_000053\nM712xh 3.7 2307781_551205 (3.7.01)\n(CF235A, CF236A, CF238A) 3.7.1 2307884_553042\n 3.7.2 2307939_554659\n\n 3.6.3 2307497_543951\nHP LaserJet Enterprise 800 3.6.4 2307619_547161 2307851_000049\ncolor M855 3.7 2307781_551201 (3.7.01)\n(A2W77A, A2W78A, A2W79A) 3.7.1 2307884_553038\n 3.7.2 2307939_554655\n\nHP LaserJet Enterprise 800 3.6.3 2307497_543946\ncolor MFP M880 3.6.4 2307619_547156 2307851_000058\n(A2W76A, A2W75A, D7P70A, 3.7 2307781_551196 (3.7.01)\nD7P71A) 3.7.1 2307884_553033\n 3.7.2 2307939_554650\n\n 3.6.3 2307497_543964\nHP LaserJet Enterprise 3.6.4 2307619_547169 2307851_000057\nColor 500 M551 Series 3.7 2307781_551209 (3.7.01)\n(CF081A,CF082A,CF083A) 3.7.1 2307884_553046\n 3.7.2 2307939_554665\n\n 3.6.3 2307497_543957\nHP LaserJet Enterprise 3.6.4 2307619_547167 2307851_000056\nColor flow MFP M575c 3.7 2307781_551207 (3.7.01)\n(CD646A) 3.7.1 2307884_553044\n 3.7.2 2307939_554662\n\n 3.6.3 2307497_543948\nHP LaserJet Enterprise 3.6.4 2307619_547158 2307851_000046\nflow M830z MFP 3.7 2307781_551198 (3.7.01)\n(CF367A) 3.7.1 2307884_553035\n 3.7.2 2307939_554652\n\n 3.6.3 2307497_543945\nHP LaserJet Enterprise 3.6.4 2307619_547155 2307851_000043\nflow MFP M525c 3.7 2307781_551195 (3.7.01)\n(CF118A) 3.7.1 2307884_553032\n 3.7.2 2307939_554649\n\n 3.6.3 2307497_543943\nHP LaserJet Enterprise 3.6.4 2307619_547153 2307851_000041\nFlow MFP M630z 3.7 2307781_551193 (3.7.01)\n(B3G85A) 3.7.1 2307884_553030\n 3.7.2 2307939_554647\n\n 3.6.3 2307497_543952\nHP LaserJet Enterprise 3.6.4 2307619_547163 2307851_000035\nM806 3.7 2307781_551202 (3.7.01)\n(CZ244A, CZ245A) 3.7.1 2307884_553039\n 3.7.2 2307939_554656\n\n 3.6.3 2307497_543943\nHP LaserJet Enterprise MFP 3.6.4 2307619_547153 2307851_000041\nM630 3.7 2307781_551193 (3.7.01)\n(J7X28A) 3.7.1 2307884_553030\n 3.7.2 2307939_554647\n\nHP LaserJet Enterprise MFP 3.6.3 2307497_543954\nM725 3.6.4 2307619_547164 2307851_000054\n(CF066A, CF067A, CF068A, 3.7 2307781_551204 (3.7.01)\nCF069A) 3.7.1 2307884_553041\n 3.7.2 2307939_554658\n\n 3.6.3 2307497_543944\nHP OfficeJet Enterprise 3.6.4 2307619_547154 2307851_000039\nColor MFP X585 3.7 2307781_551194 (3.7.01)\n(B5L04A, B5L05A, B5L07A) 3.7.1 2307884_553031\n 3.7.2 2307939_554648\n\n 3.6.3 2307497_543949\nHP OfficeJet Enterprise 3.6.4 2307619_547159 2307851_000047\nColor X555 3.7 2307781_551199 (3.7.01)\n(C2S11A, C2S12A) 3.7.1 2307884_553036\n 3.7.2 2307939_554653\n\nSystem management and security procedures must be reviewed frequently to\nmaintain system integrity. HP is continually reviewing and enhancing the\nsecurity features of software products to provide customers with current secure\nsolutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the\nattention of users of the affected HP products the important security\ninformation contained in this Bulletin. HP recommends that all users determine\nthe applicability of this information to their individual situations and take\nappropriate action. HP does not warrant that this information is necessarily\naccurate or complete for all user situations and, consequently, HP will not be\nresponsible for any damages resulting from user\u0027s use or disregard of the\ninformation provided in this Bulletin. To the extent permitted by law, HP\ndisclaims all warranties, either express or implied, including the warranties\nof merchantability and fitness for a particular purpose, title and\nnon-infringement.\"\n\nREVISION HISTORY\n\nVersion:1 (rev.1) ? 01 March 2016 Initial release\n\nCopyright 2016 Hewlett-Packard Development Company, L.P. \n\nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or its\naffiliates, subcontractors or suppliers will be liable for incidental,special\nor consequential damages including downtime cost; lost profits;damages relating\nto the procurement of substitute products or services; or damages for loss of\ndata, or software restoration. The information in this document is subject to\nchange without notice. Hewlett-Packard Company and the names of Hewlett-Packard\nproducts referenced herein are trademarks of Hewlett-Packard Company in the\nUnited States and other countries. Other product and company names mentioned\nherein may be trademarks of their respective owners. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2\n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\nUaJxLGryGjM699Yk6htj\n=zguU\n-----END PGP SIGNATURE-----\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-2244"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001685"
},
{
"db": "CNVD",
"id": "CNVD-2016-01472"
},
{
"db": "VULHUB",
"id": "VHN-91063"
},
{
"db": "VULMON",
"id": "CVE-2016-2244"
},
{
"db": "PACKETSTORM",
"id": "136086"
}
],
"trust": 2.43
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-91063",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-91063"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-2244",
"trust": 3.3
},
{
"db": "SECTRACK",
"id": "1035191",
"trust": 1.2
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001685",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201603-032",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-01472",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2016.0581",
"trust": 0.6
},
{
"db": "BID",
"id": "84119",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "136086",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-91063",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2016-2244",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-01472"
},
{
"db": "VULHUB",
"id": "VHN-91063"
},
{
"db": "VULMON",
"id": "CVE-2016-2244"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001685"
},
{
"db": "PACKETSTORM",
"id": "136086"
},
{
"db": "NVD",
"id": "CVE-2016-2244"
},
{
"db": "CNNVD",
"id": "CNNVD-201603-032"
}
]
},
"id": "VAR-201603-0041",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-01472"
},
{
"db": "VULHUB",
"id": "VHN-91063"
}
],
"trust": 1.7
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-01472"
}
]
},
"last_update_date": "2023-12-18T12:37:50.045000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "HPSBPI03546",
"trust": 0.8,
"url": "https://h20565.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c05030353"
},
{
"title": "Patches for multiple HP product information disclosure vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/72315"
},
{
"title": "Multiple HP Product information disclosure vulnerability repair measures",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60393"
},
{
"title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBPI03546 rev.3 - HP LaserJet Printers and MFPs, HP OfficeJet Enterprise Printers, Remote Disclosure of Information",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=98c97fa8301c12f010f5fb2417d7b8a7"
},
{
"title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBPI03546 rev.3 - HP LaserJet Printers and MFPs, HP OfficeJet Enterprise Printers, Remote Disclosure of Information",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=4477abc19111a909e7af065561dbdf62"
},
{
"title": "HP: HPSBPI03546 rev.3 - HP LaserJet Printers and MFPs, HP OfficeJet Enterprise Printers, Remote Disclosure of Information",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=hpsbpi03546"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-01472"
},
{
"db": "VULMON",
"id": "CVE-2016-2244"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001685"
},
{
"db": "CNNVD",
"id": "CNNVD-201603-032"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-91063"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001685"
},
{
"db": "NVD",
"id": "CVE-2016-2244"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.3,
"url": "https://h20565.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c05030353"
},
{
"trust": 1.2,
"url": "https://h20565.www2.hp.com/hpsc/doc/public/display?docid=3demr_na-c05030353"
},
{
"trust": 1.2,
"url": "http://www.securitytracker.com/id/1035191"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2244"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2244"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/render.html?it=31933"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/200.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://support.hp.com//us-en/document/c05030353"
},
{
"trust": 0.1,
"url": "https://www.securityfocus.com/bid/84119"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-2244"
},
{
"trust": 0.1,
"url": "https://www.hp.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-01472"
},
{
"db": "VULHUB",
"id": "VHN-91063"
},
{
"db": "VULMON",
"id": "CVE-2016-2244"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001685"
},
{
"db": "PACKETSTORM",
"id": "136086"
},
{
"db": "NVD",
"id": "CVE-2016-2244"
},
{
"db": "CNNVD",
"id": "CNNVD-201603-032"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-01472"
},
{
"db": "VULHUB",
"id": "VHN-91063"
},
{
"db": "VULMON",
"id": "CVE-2016-2244"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-001685"
},
{
"db": "PACKETSTORM",
"id": "136086"
},
{
"db": "NVD",
"id": "CVE-2016-2244"
},
{
"db": "CNNVD",
"id": "CNNVD-201603-032"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-03-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-01472"
},
{
"date": "2016-03-04T00:00:00",
"db": "VULHUB",
"id": "VHN-91063"
},
{
"date": "2016-03-04T00:00:00",
"db": "VULMON",
"id": "CVE-2016-2244"
},
{
"date": "2016-03-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-001685"
},
{
"date": "2016-03-04T22:51:49",
"db": "PACKETSTORM",
"id": "136086"
},
{
"date": "2016-03-04T15:59:01.500000",
"db": "NVD",
"id": "CVE-2016-2244"
},
{
"date": "2016-03-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201603-032"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-03-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-01472"
},
{
"date": "2016-12-03T00:00:00",
"db": "VULHUB",
"id": "VHN-91063"
},
{
"date": "2016-12-03T00:00:00",
"db": "VULMON",
"id": "CVE-2016-2244"
},
{
"date": "2016-03-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-001685"
},
{
"date": "2016-12-03T03:24:51.443000",
"db": "NVD",
"id": "CVE-2016-2244"
},
{
"date": "2016-03-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201603-032"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201603-032"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural HP Vulnerability in obtaining important information in printer product firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-001685"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201603-032"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.