CVE-2019-6337 (GCVE-0-2019-6337)

Vulnerability from cvelistv5 – Published: 2019-11-07 14:37 – Updated: 2024-08-04 20:16
VLAI?
Summary
For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device.
Severity ?
No CVSS data available.
CWE
  • Buffer Overflow, Disclosure of Information
Assigner
hp
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:16:24.827Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hp.com/us-en/document/c06458150"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HP OfficeJet Pro 8210 Printer series,HP PageWide 352dw Printer,HP PageWide 377dw Multifunction Printer,HP PageWide Managed P55250dw Printer series,HP PageWide Managed P57750dw Multifunction Printer series,HP PageWide Managed P52750dw Multifunction Printer,HP PageWide Pro 452dn Printer series,HP PageWide Pro 452dw Printer series,HP PageWide Pro 477dn Multifunction Printer series,HP PageWide Pro 477dw Multifunction Printer series,HP PageWide Pro 552dw Printer series,HP PageWide Pro 577dw Multifunction Printer series",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "001.1937C or later For all models"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Buffer Overflow, Disclosure of Information",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-07T14:37:09",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hp.com/us-en/document/c06458150"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "hp-security-alert@hp.com",
          "ID": "CVE-2019-6337",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HP OfficeJet Pro 8210 Printer series,HP PageWide 352dw Printer,HP PageWide 377dw Multifunction Printer,HP PageWide Managed P55250dw Printer series,HP PageWide Managed P57750dw Multifunction Printer series,HP PageWide Managed P52750dw Multifunction Printer,HP PageWide Pro 452dn Printer series,HP PageWide Pro 452dw Printer series,HP PageWide Pro 477dn Multifunction Printer series,HP PageWide Pro 477dw Multifunction Printer series,HP PageWide Pro 552dw Printer series,HP PageWide Pro 577dw Multifunction Printer series",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "001.1937C or later For all models"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Buffer Overflow, Disclosure of Information"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hp.com/us-en/document/c06458150",
              "refsource": "MISC",
              "url": "https://support.hp.com/us-en/document/c06458150"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2019-6337",
    "datePublished": "2019-11-07T14:37:09",
    "dateReserved": "2019-01-15T00:00:00",
    "dateUpdated": "2024-08-04T20:16:24.827Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-6337\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2019-11-07T15:15:11.070\",\"lastModified\":\"2024-11-21T04:46:26.230\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device.\"},{\"lang\":\"es\",\"value\":\"Para las impresoras listadas, un archivo de impresi\u00f3n dise\u00f1ado con fines maliciosos puede causar que determinadas impresoras HP Inkjet se confirmen. Bajo ciertas circunstancias, la impresora produce un volcado de n\u00facleo en un dispositivo local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L\",\"baseScore\":5.2,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":0.9,\"impactScore\":4.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:N/A:P\",\"baseScore\":3.3,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d9l63a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937c\",\"matchCriteriaId\":\"352A01F4-786C-47F3-91CD-C291F30322DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70003792-C31A-413D-A797-1ECD47DB40F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d9l64a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937c\",\"matchCriteriaId\":\"0B1A3011-D519-4D84-BACC-7288F4D66EE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"579CB9CB-AA44-4761-BB9A-F17648F08810\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t0g70a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937c\",\"matchCriteriaId\":\"E0AA3854-7704-44FD-A5CA-4DD321B8093F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEE2DE16-2E4D-4111-958C-611F1F8DA9C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j3p65a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937c\",\"matchCriteriaId\":\"EEE3EFA6-C349-4088-9C9B-95DB9E812D74\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j3p65a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4C09B23-4574-4560-8676-C294D0205C71\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j3p68a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937c\",\"matchCriteriaId\":\"DD58EBB2-6F62-45C9-9F03-A4E7C87BA323\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC3438C-2004-4F7A-990E-7BF9AEEFBC4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j6u57a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"9E896D6C-B17C-4C7A-BE2C-E1235515B49F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j6u57a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91F67235-1DE9-47F9-9A3A-AE2F6DB1A5ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j6u57b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"C3FC64B9-4F4F-4EAA-9F58-E910D95BBF54\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDB02B60-DA6C-4775-8D73-389E30961432\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j9v80a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"7532069E-32F1-497E-8526-CDD79DA1CA8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F26E4A0-0CA3-4A2B-A2C1-9E6866FCD6AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j9v80b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"4662B538-C208-458F-B64A-0877726371AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB2B7993-1C87-4305-BFF9-98639CECBD3C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j6u55a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"BFB2BBE2-2821-4994-8FA5-29298C6217D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1600E28F-767B-4495-8063-A66984484C94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j6u55d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"18ADF400-A200-428B-80FD-17E82137B54E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03DDBE01-B5D4-4FA4-9A90-234FAE9DC6D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j6u51b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"F8AE134F-52B0-474F-9BA6-5C125470DCC4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j6u51b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CB1F70D-EB33-497F-BC18-C197FAACAAD4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j9v82a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"615ECDA7-2DFB-413F-BF21-077A4479CC1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08C32078-2873-4B07-B218-DF2937C8E581\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j9v82d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"E206228B-8CD0-482F-9A83-FD400D8D65ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1184E875-E054-4D88-BBD8-93237C24B371\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j9v78b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"69B78A6D-FDAC-4BA6-8A4B-611673ADCD39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j9v78b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7625F93D-5E73-4AAD-99A3-8AC2AAAE0612\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q15a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"CE1A5C31-C198-45EB-A87F-A37C520DA520\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D8C5DC9-7082-4732-AF3F-599E595185D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q15b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"1E32A214-2672-4588-A72B-A0257C1C24F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C048F3-0EA5-4C7E-BCD4-8A6E6F9F218B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q15d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"3406B9CC-8FC0-4283-9601-3D93CE246150\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BA6A88E-B1ED-40EC-898E-490D803E1273\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q16a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"63BD439C-1171-4A77-9832-A54A8319D3F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DAC8056-DE49-4FE0-8BE0-EB4E22C03AED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q16d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"13CD5BBA-91BC-42E8-B05D-113D7C01CEB7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C0155AB-8D9E-4822-86B1-6702FD3A1F21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w2z52b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"586EFF40-D20C-4E65-A86D-7BFD69F26E44\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w2z52b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B215E8-D636-418C-AB0C-3F23F36B37D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q19a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"71544467-64C7-4AB3-A94A-18A2F1EC268B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54254FBD-2197-4A39-9BD0-1D51C711046C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q19b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"ABCF860C-2FA3-42B1-8039-1D0B49157BA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q19b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7DCA80B-8127-4011-B185-F14EAB8B89EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q19d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"F181AF0B-B2BD-4781-9314-FD5E05D1A7DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A43BA0-2C47-4A57-BBE6-9A57ABB37212\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q20a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"765254C9-5A71-4E13-9288-7EB3AE8A47FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61942DC4-E95F-4A0F-95B1-304CEE7B569C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q20b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"86C3B42B-76A8-48A3-A836-8DB3F5F33D83\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A96E5227-0B40-493A-BC97-0944A88A3C52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q20c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"7E5539CA-CEDD-44D3-92F1-F2DA8F5B81CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF2A84C2-DA6E-4C0A-86D4-185452936C66\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q20d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"0A1EA4FC-8226-459C-A2C6-CD5370C40D09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC594695-B974-447F-8430-2928DE7D4C62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w2z53b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"59ED22B3-4716-40FB-9C52-F2D2AF3AC2C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w2z53b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34897D9B-C0AF-4411-85C7-586ED2C72218\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:2dr21d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"932C298B-9160-43D2-9E76-A943526F40AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:2dr21d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F64BDFC-D848-462C-84C4-0417622B0DEB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q17a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"7840467A-7605-4CE5-B3EB-45F6D54CF74C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6FBBEA7-14B6-4B35-8A72-08FB3DD8F93D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q17d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"D53CDE63-B3D0-4F3F-A656-24DCDCD2D04A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D110EEE-2A44-4BC5-90DB-C3D146EF08D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:k9z74a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"8FEE20CA-EFE3-492C-BA2E-9C117F02D458\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:k9z74a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"491B07B3-E286-4046-98F1-D8BEFA526C80\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:k9z74d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"C5F22175-7EC3-41BE-B642-A333E0245A40\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:k9z74d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02206B82-E599-4B35-A60C-CA98A137B008\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q21a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"F049DA70-73C6-4CB3-B744-4327F11ADF6B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0541BF3-4A4B-424F-AC23-7026C7E35AB0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q21b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"65AD0E29-057D-4E7C-80C2-D7A40401799E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q21b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4CFA09F-2CA1-4AD3-8F2E-BB7160375D05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q21c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"37BF997F-772A-4D06-8404-21F6E1CD10F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"491BE10D-F37A-4FF7-8789-D0BA442F1E28\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q21d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"82C5A28B-89C0-469A-BA77-C1B85CE5D711\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35AE3072-B57E-4CEB-A0C7-C4B87B194C30\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:k9z76a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"5A81C65F-3BC9-4FBD-BF10-6D52CAD99A20\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C5DD0B-4C8C-45DE-AEBA-6942CE4B6E93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:k9z76b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"098D018F-A8BC-4FED-8AA4-9D032E9B3E8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:k9z76b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C143BDCE-586F-479E-BC8E-385F3FA4FC0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:k9z76d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"8DA79564-DF22-42A0-AA2A-8D1E90C719BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CB96063-CC55-4EA7-87E5-34A68322E7F7\"}]}]}],\"references\":[{\"url\":\"https://support.hp.com/us-en/document/c06458150\",\"source\":\"hp-security-alert@hp.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.hp.com/us-en/document/c06458150\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…