Cyber Posture

CVE-2025-26507

Critical

Published: 14 February 2025

Published
14 February 2025
Modified
15 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0245 85.3th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-26507 is a high-severity vulnerability affecting certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers. It enables remote code execution (RCE) and elevation of privilege when the devices process a malicious PostScript print job. The issue stems from a buffer overflow (CWE-121) in the PostScript processing component, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical risk due to its network accessibility and lack of prerequisites.

Unauthenticated attackers on the network can exploit this vulnerability by sending a specially crafted PostScript print job to the targeted printer. Successful exploitation allows arbitrary code execution on the device with elevated privileges, potentially leading to full compromise of the printer's operating system. This grants attackers high-impact control over confidentiality, integrity, and availability, such as data exfiltration, lateral movement within the network, or using the printer as a pivot point.

HP's security bulletin (HPSBPI-04007) at https://support.hp.com/us-en/document/ish_11953771-11953793-16/hpsbpi04007 provides details on affected models, firmware versions, and recommended mitigations, including applying the latest firmware patches to address the vulnerability.

Details

CWE(s)
CWE-121

Affected Products

hp
futuresmart 3
≤ 2309118_002276 · ≤ 2309118_002274 · ≤ 2309118_002275
hp
futuresmart 5
≤ 2508402_000067 · ≤ 2508402_000106 · ≤ 2508402_000106
hp
futuresmart 4
≤ 2411278_068111 · ≤ 2411278_068112 · ≤ 2411278_068114

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The CVE describes unauthenticated network-accessible RCE via malicious PostScript print job exploiting a buffer overflow, directly enabling exploitation of public-facing/remote services for initial access and privilege escalation on the device.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References