CVE-2024-2209 (GCVE-0-2024-2209)

Vulnerability from cvelistv5 – Published: 2024-03-26 23:49 – Updated: 2024-08-06 18:48
VLAI?
Title
HP Printer Firmware Update Utility for Certain HP DeskJet Printers - Potential Execution of Arbitrary Code
Summary
A user with administrative privileges can create a compromised dll file of the same name as the original dll within the HP printer’s Firmware Update Utility (FUU) bundle and place it in the Microsoft Windows default downloads directory which can lead to potential arbitrary code execution.
CWE
  • CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
hp
Impacted products
Vendor Product Version
HP, Inc. HP Printer Firmware Update Utility Unknown: See HP security bulletin reference for affected versions
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T19:03:39.393Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.hp.com/us-en/document/ish_10354903-10354932-16"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:hp_inc:hp_printer_firmware_update_utility:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "hp_printer_firmware_update_utility",
            "vendor": "hp_inc",
            "versions": [
              {
                "status": "unknown",
                "version": "0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "LOW",
              "baseScore": 6.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-2209",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-06T18:40:34.729273Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-94",
                "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:48:35.083Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "HP Printer Firmware Update Utility",
          "vendor": "HP, Inc.",
          "versions": [
            {
              "status": "unknown",
              "version": "See HP security bulletin reference for affected versions"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A user with administrative privileges can create a compromised dll file of the same name as the original dll within the HP printer\u2019s Firmware Update Utility (FUU) bundle and place it in the Microsoft Windows default downloads directory which can lead to potential arbitrary code execution."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-26T23:49:12.512Z",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "url": "https://support.hp.com/us-en/document/ish_10354903-10354932-16"
        }
      ],
      "title": "HP Printer Firmware Update Utility for Certain HP DeskJet Printers - Potential Execution of Arbitrary Code",
      "x_generator": {
        "engine": "cveClient/1.0.15"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2024-2209",
    "datePublished": "2024-03-26T23:49:12.512Z",
    "dateReserved": "2024-03-05T22:45:36.860Z",
    "dateUpdated": "2024-08-06T18:48:35.083Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-2209\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2024-03-27T00:15:07.817\",\"lastModified\":\"2026-02-20T21:15:05.470\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A user with administrative privileges can create a compromised dll file of the same name as the original dll within the HP printer\u2019s Firmware Update Utility (FUU) bundle and place it in the Microsoft Windows default downloads directory which can lead to potential arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Un usuario con privilegios administrativos puede crear un archivo dll comprometido con el mismo nombre que el dll original dentro del paquete Firmware Update Utility (FUU) de la impresora HP y colocarlo en el directorio de descargas predeterminado de Microsoft Windows, lo que puede conducir a una posible ejecuci\u00f3n de c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":0.8,\"impactScore\":5.5}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k70b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"F48B9BB8-7A5C-4128-A748-B7F476CBBF44\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k70b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1342DEBB-0F79-4A7A-8182-808BAE1D6F56\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:297x1a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"7172A2BC-D487-4F92-ACA9-D9322A84FAD5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:297x1a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07A0FC4-F5AD-4B91-B02C-235F8F1B1846\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:2a9q5a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"B4C8C93F-1282-4FE4-9CF6-389E149D4B93\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:2a9q5a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C799894-9FA5-4408-964E-2A5E7011AB50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k72a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"101F1D7D-8327-4079-ACA8-A1059D0E1A5C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k72a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6441EE2E-2CFC-437B-90D6-55F71BEC6D8D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k69a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"6A0CBE1A-09E6-4C30-B121-FA11144C2B8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k69a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"210A4248-EC14-447D-9952-2686AE5EF774\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k70a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"FFE185BF-DB00-4F2A-9146-D017910F587D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k70a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"184ACCC3-43EF-41AD-8D4B-3337578062DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k71a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"985C9753-4603-4403-96F5-F065BA472EFF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k71a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"964E7E18-88A4-4E6A-933E-47B625EA19FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k68a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"348371AA-9730-427A-A690-72843EC08FC2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k68a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10E3CA7-F1F1-4A39-82C0-040A0140BECE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k67a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"63E87B91-9111-4934-A97E-7A5438C23C48\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k67a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5592B744-D905-4FD4-9D73-52D66A475D16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:3xv19a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"F65C7C59-6179-4F54-8587-14F1B78AA865\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:3xv19a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E42D2AB-5AF9-49DF-AA78-81EAF65A5C1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr52a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"5AA27F41-34F9-4134-BA6E-2E098D800509\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr52a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D44F5192-3E3D-4DE4-9986-F738B59D3ADB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr57a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"BE28F550-D45A-4E2D-AA16-2025297F2E8A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr57a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BA71B99-0E28-47E1-AE1B-8F1B9E562B08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr53a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"93A67D1C-6243-4EA4-9795-E432FEF0BE99\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr53a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58E46B34-96B6-41AD-9CAF-806540E755B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr58a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"CB3080B7-EC6E-4AC9-B910-9AF9EDFB785E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr58a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF18A44-EDA1-4990-BEBB-41432FC54C8D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr61a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"99634CAE-FC56-4E9A-8FA1-1D489B9EA8AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr61a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB1D873B-7300-4FD7-AD36-BF283B94C4C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5ar83a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"3DF8844C-2BCA-4265-B8E4-843A020C09A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5ar83a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DA20F74-04EA-44E0-A715-CECE366FD14F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5ar84a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"AC4CF765-388D-464C-B738-8BB60EC93E51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5ar84a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D488656E-7267-4630-BD1C-014F62FF43B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5ar85a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"52CD0929-A904-4623-8D01-F11C5E9D2BA4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5ar85a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53544C5C-73F3-4C4F-B2E2-D79EDD08CF5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:8rk11a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"BD762115-68E9-47BB-835C-86E05CCDE59B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:8rk11a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F092CA4E-B068-4DE0-B336-E9C961322282\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:3xv17a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"1B4C7B15-3CA4-46E7-8B63-B377BA89EF60\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:3xv17a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"051D654D-DFE7-4261-AD70-17FBEE36E84D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ws04a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"5D3E5831-6BF7-4C3F-B9A4-1F2ED8BD32B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ws04a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11362C7A-2FC7-412E-97C2-D51CAF712DC1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr21a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"27E0A587-FD46-477D-B07D-A0FE199713F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr21a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7321F31E-AB98-45E0-A753-9F128CF24A89\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr20a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"A9BE98B2-510A-453B-BF36-DE6158C25DC1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr20a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF58EE0-0A0D-4F12-A987-BB63B6F2B12E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k72b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"C6756F18-8F37-454A-A882-D2749F20F3A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k72b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3139D639-A3F6-46D6-855A-75ECBBE03099\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k67b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"37CA5887-14B4-4AFC-8E75-15F1B6C1B244\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k67b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"277D9F1D-D542-4FF1-93F1-8DA5AAE9968D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:297w8a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"2E9049B6-17F1-4E08-AB5E-5CF4C13A2049\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:297w8a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB79019A-F8BD-46F5-BFC4-1B37273F38DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k68b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"078A3090-C16A-44CD-91C3-B1F4DE45E2A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k68b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF69A35-B2D2-49A6-A33E-1D6FDD3ECA6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:297x0a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"C47AC0FD-B130-4C1D-A49E-68DD7C2D6714\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:297x0a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"149CCD60-293A-4CD0-9D35-467D46C22CF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k70b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"55F95741-79E9-4D6E-B9EB-0BB90DEAB770\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k70b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1342DEBB-0F79-4A7A-8182-808BAE1D6F56\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:297x1a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"B7A2E056-E2FD-4FC2-A92A-E528CBA634E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:297x1a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07A0FC4-F5AD-4B91-B02C-235F8F1B1846\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:2a9q5a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"28CF235E-4250-41E9-92CE-3D90375ABFE5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:2a9q5a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C799894-9FA5-4408-964E-2A5E7011AB50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k72a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"3651E7E3-D824-4AF9-B5D0-0CFEC2157DD8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k72a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6441EE2E-2CFC-437B-90D6-55F71BEC6D8D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k69a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"F8BBA90F-1BDB-4E01-BB3B-B857DCD549DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k69a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"210A4248-EC14-447D-9952-2686AE5EF774\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k70a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"AB15DE57-1272-44A6-8AAE-F85634A5352C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k70a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"184ACCC3-43EF-41AD-8D4B-3337578062DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k71a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"A465F6E7-7D2C-4774-BF3D-44B5B7AA2D03\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k71a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"964E7E18-88A4-4E6A-933E-47B625EA19FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k68a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"92CD5B12-A091-48A9-8318-5D00BE522B0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k68a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10E3CA7-F1F1-4A39-82C0-040A0140BECE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k67a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"15437BC2-0FC6-431F-AC58-8E69F73321EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k67a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5592B744-D905-4FD4-9D73-52D66A475D16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:3xv19a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"EF124EAA-2E0D-4635-B779-03D64455F645\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:3xv19a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E42D2AB-5AF9-49DF-AA78-81EAF65A5C1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr52a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"19BF3FA6-FBA6-482B-B920-9CFB26BB8A3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr52a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D44F5192-3E3D-4DE4-9986-F738B59D3ADB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr57a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"A87693EE-50F4-4444-9734-695C4AAD63AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr57a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BA71B99-0E28-47E1-AE1B-8F1B9E562B08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k72b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"2571D776-5354-4B5C-A0EE-341B97BD3863\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k72b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3139D639-A3F6-46D6-855A-75ECBBE03099\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k67b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"862DA612-0AD2-49AC-8ECB-8EC7B2965C27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k67b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"277D9F1D-D542-4FF1-93F1-8DA5AAE9968D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:297w8a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"1F956959-8E0D-486A-A5B3-6C7E263B8CF9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:297w8a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB79019A-F8BD-46F5-BFC4-1B37273F38DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k68b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"CEF36EC9-233F-46EC-ABED-2691653C14DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k68b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF69A35-B2D2-49A6-A33E-1D6FDD3ECA6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:297x0a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349b\",\"matchCriteriaId\":\"C210349E-E32B-453E-9A5B-DB9E24FFA17C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:297x0a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"149CCD60-293A-4CD0-9D35-467D46C22CF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr53a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"1C2DADB7-B790-40D5-B539-64392026B225\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr53a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58E46B34-96B6-41AD-9CAF-806540E755B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr58a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"E3886D75-5F23-44CE-A631-369A637D21BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr58a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF18A44-EDA1-4990-BEBB-41432FC54C8D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr61a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"0EA7B5DA-E40A-4FB0-A32C-D47B177CB5EB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr61a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB1D873B-7300-4FD7-AD36-BF283B94C4C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5ar83a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"DD7CFDBF-617B-4789-98A6-C1B30AD9FC6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5ar83a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DA20F74-04EA-44E0-A715-CECE366FD14F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5ar84a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"54D719AE-3875-484B-B967-644F1ACCDEDC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5ar84a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D488656E-7267-4630-BD1C-014F62FF43B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5ar85a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"2580E5EF-A993-498B-AD03-501E7B727693\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5ar85a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53544C5C-73F3-4C4F-B2E2-D79EDD08CF5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:8rk11a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"88112990-DDC2-4D5D-979E-6DCB8C09AF54\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:8rk11a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F092CA4E-B068-4DE0-B336-E9C961322282\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:3xv17a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"D16CA480-9E87-43E7-B23D-E9C51AF9410F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:3xv17a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"051D654D-DFE7-4261-AD70-17FBEE36E84D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ws04a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"DE3A53AE-EE6F-450C-BD17-FBC8FA5DA8C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ws04a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11362C7A-2FC7-412E-97C2-D51CAF712DC1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr21a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"499C81FC-7D02-4F3C-BCCA-8B374168FB97\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr21a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7321F31E-AB98-45E0-A753-9F128CF24A89\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr20a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349c\",\"matchCriteriaId\":\"0DFDD981-9F7D-4FFD-82C5-C6ACEE92F9EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr20a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF58EE0-0A0D-4F12-A987-BB63B6F2B12E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr21a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"1E310E9F-F6C2-47A0-8467-357F8E2A0AA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr21a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7321F31E-AB98-45E0-A753-9F128CF24A89\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k72b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"72055314-223B-4AEA-B14A-EE715A9D6C00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k72b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3139D639-A3F6-46D6-855A-75ECBBE03099\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k67b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"73A996F8-7F18-48D1-83AE-D48246A7EA55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k67b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"277D9F1D-D542-4FF1-93F1-8DA5AAE9968D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:297w8a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"EE3F4DDB-31EF-40A0-8D31-8B2BD0E49F90\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:297w8a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB79019A-F8BD-46F5-BFC4-1B37273F38DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k68b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"CBB5B870-2CC1-47AB-9B0F-186F4A68F62B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k68b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF69A35-B2D2-49A6-A33E-1D6FDD3ECA6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:297x0a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"2AB83766-9296-44B5-9592-CD43DA4D3224\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:297x0a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"149CCD60-293A-4CD0-9D35-467D46C22CF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k70b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"F15E269A-30D6-413E-BA49-6CD35A26A953\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k70b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1342DEBB-0F79-4A7A-8182-808BAE1D6F56\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:297x1a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"74E7D8EA-A3FF-4E8F-85E6-27E0B03AB08C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:297x1a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07A0FC4-F5AD-4B91-B02C-235F8F1B1846\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:2a9q5a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"498A3714-F33C-427E-999B-9DE2786E211C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:2a9q5a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C799894-9FA5-4408-964E-2A5E7011AB50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k72a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"8128361D-874E-4F75-96E8-D4DFA55FD29C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k72a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6441EE2E-2CFC-437B-90D6-55F71BEC6D8D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k69a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"4EFABA0C-FC74-4EDF-BF34-677FCB3B8FDE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k69a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"210A4248-EC14-447D-9952-2686AE5EF774\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k70a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"AF983B9E-D179-4A7B-B640-E6C47A5DDA6D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k70a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"184ACCC3-43EF-41AD-8D4B-3337578062DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k71a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"54CFC470-CAB3-4594-8D71-3ABDCDEDA768\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k71a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"964E7E18-88A4-4E6A-933E-47B625EA19FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k68a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"2A5687FF-63F9-4CAD-BF6D-67C314EB006E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k68a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10E3CA7-F1F1-4A39-82C0-040A0140BECE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:26k67a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"2A645CE5-FA67-4733-B218-AFFDB10DF85A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:26k67a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5592B744-D905-4FD4-9D73-52D66A475D16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:3xv19a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"9476C112-EAF8-4996-869F-7ED9117A64D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:3xv19a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E42D2AB-5AF9-49DF-AA78-81EAF65A5C1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr52a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"FE05F1B2-ABD2-4E35-A512-48E428D15534\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr52a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D44F5192-3E3D-4DE4-9986-F738B59D3ADB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr57a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"65297AE1-C9AB-44EF-96BA-520D293F5863\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr57a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BA71B99-0E28-47E1-AE1B-8F1B9E562B08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr53a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"220F03DE-F75F-4EA3-8751-3FD1DE071ADC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr53a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58E46B34-96B6-41AD-9CAF-806540E755B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr58a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"88EA6435-675B-4FA1-8317-D8E68027936A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr58a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF18A44-EDA1-4990-BEBB-41432FC54C8D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:7fr61a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"991EC41E-3F38-4C34-8606-B997D7312013\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:7fr61a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB1D873B-7300-4FD7-AD36-BF283B94C4C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5ar83a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"96795E1A-6288-460E-92AF-21D8CC76DB9B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5ar83a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DA20F74-04EA-44E0-A715-CECE366FD14F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5ar84a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"62E2E29F-692C-486A-BBBD-26722A858E09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5ar84a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D488656E-7267-4630-BD1C-014F62FF43B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:5ar85a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"6FAE3F14-3A3A-4646-B796-D17F512FF4AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:5ar85a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53544C5C-73F3-4C4F-B2E2-D79EDD08CF5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:8rk11a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"9FA7FE28-D3DB-475A-B925-A45C3B61CD9C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:8rk11a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F092CA4E-B068-4DE0-B336-E9C961322282\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:3xv17a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"6FA44D24-0AAA-4D0E-8B0F-8C293B062C16\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:3xv17a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"051D654D-DFE7-4261-AD70-17FBEE36E84D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:4ws04a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2349d\",\"matchCriteriaId\":\"8F1FDBFB-299A-4897-A0C4-CCBCEA443A1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:4ws04a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11362C7A-2FC7-412E-97C2-D51CAF712DC1\"}]}]}],\"references\":[{\"url\":\"https://support.hp.com/us-en/document/ish_10354903-10354932-16\",\"source\":\"hp-security-alert@hp.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.hp.com/us-en/document/ish_10354903-10354932-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.hp.com/us-en/document/ish_10354903-10354932-16\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T19:03:39.393Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-2209\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-06T18:40:34.729273Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:hp_inc:hp_printer_firmware_update_utility:*:*:*:*:*:*:*:*\"], \"vendor\": \"hp_inc\", \"product\": \"hp_printer_firmware_update_utility\", \"versions\": [{\"status\": \"unknown\", \"version\": \"0\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-94\", \"description\": \"CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-06T18:43:54.412Z\"}}], \"cna\": {\"title\": \"HP Printer Firmware Update Utility for Certain HP DeskJet Printers - Potential Execution of Arbitrary Code\", \"affected\": [{\"vendor\": \"HP, Inc.\", \"product\": \"HP Printer Firmware Update Utility\", \"versions\": [{\"status\": \"unknown\", \"version\": \"See HP security bulletin reference for affected versions\"}], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://support.hp.com/us-en/document/ish_10354903-10354932-16\"}], \"x_generator\": {\"engine\": \"cveClient/1.0.15\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A user with administrative privileges can create a compromised dll file of the same name as the original dll within the HP printer\\u2019s Firmware Update Utility (FUU) bundle and place it in the Microsoft Windows default downloads directory which can lead to potential arbitrary code execution.\"}], \"providerMetadata\": {\"orgId\": \"74586083-13ce-40fd-b46a-8e5d23cfbcb2\", \"shortName\": \"hp\", \"dateUpdated\": \"2024-03-26T23:49:12.512Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-2209\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-06T18:48:35.083Z\", \"dateReserved\": \"2024-03-05T22:45:36.860Z\", \"assignerOrgId\": \"74586083-13ce-40fd-b46a-8e5d23cfbcb2\", \"datePublished\": \"2024-03-26T23:49:12.512Z\", \"assignerShortName\": \"hp\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…