Cyber Posture

CVE-2025-26506

Critical

Published: 14 February 2025

Published
14 February 2025
Modified
15 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0206 84.0th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-26506 is a critical vulnerability enabling remote code execution (RCE) and elevation of privilege in certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers. It occurs when processing a PostScript print job and stems from CWE-121 (stack-based buffer overflow). Published on 2025-02-14, the issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its high severity due to network accessibility and lack of prerequisites.

An unauthenticated attacker with network access to the printer can exploit the vulnerability by sending a malicious PostScript print job. No user interaction or privileges are required, allowing low-complexity exploitation that achieves RCE and privilege escalation, compromising confidentiality, integrity, and availability of the device.

The HP security bulletin at https://support.hp.com/us-en/document/ish_11953771-11953793-16/hpsbpi04007 provides details on mitigation, including affected models and recommended patches or workarounds.

Details

CWE(s)
CWE-121

Affected Products

hp
499q9e firmware
≤ 6.17.5.34-202412122146
hp
499q9f firmware
≤ 6.17.5.34-202412122146
hp
499r0a firmware
≤ 6.17.5.34-202412122146
hp
499r0e firmware
≤ 6.17.5.34-202412122146
hp
499r0f firmware
≤ 6.17.5.34-202412122146
hp
4ra80a firmware
≤ 6.17.5.34-202412122146
hp
4ra80e firmware
≤ 6.17.5.34-202412122146
hp
4ra80f firmware
≤ 6.17.5.34-202412122146
hp
4ra81a firmware
≤ 6.17.5.34-202412122146
hp
4ra81e firmware
≤ 6.17.5.34-202412122146
+85 more product configuration(s) — see NVD for full list

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The unauthenticated network-accessible stack-based buffer overflow in PostScript processing directly enables remote exploitation of a public-facing printer service (T1190) and achieves RCE with privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References