Lucene search

K
hpHP Product Security Response TeamHP:C05872536
HistoryJan 09, 2018 - 12:00 a.m.

HP Printing Security Advisory - KRACK Attacks Potential Vulnerabilities

2018-01-0900:00:00
HP Product Security Response Team
support.hp.com
43

6.8 Medium

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

5.4 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:M/Au:N/C:P/I:P/A:P

Potential Security Impact

KRACK Attacks

VULNERABILITY SUMMARY

On October 16, security researchers publicly announced vulnerabilities in the WiFi WPA2 standard. See the References section below for links to additional resources describing the KRACK Attacks WPA2 potential vulnerabilities in detail.

The HP printing devices and networking accessories listed below are susceptible to the applicable vulnerabilities (CVE) noted in the References section below. However, the vulnerabilities described in the CVEs can be mitigated for each of these devices and accessories as set forth in the Workarounds section below.

  • HP LaserJet Enterprise printers and multifunction printers

  • HP LaserJet Managed printers and multifunction printers

  • HP LaserJet Pro printers and multifunction printers

  • HP PageWide Enterprise printers and multifunction printers

  • HP PageWide Pro printers and multifunction printers

  • HP OfficeJet Enterprise series printers and multifunction printers

  • HP OfficeJet Pro printers and multifunction printers

  • HP Inkjet (DeskJet, Envy, PhotoSmart) printers and multifunction printers

  • HP DesignJet large format printers

  • HP JetDirect wireless print server accessories

RESOLUTION

Customers may mitigate risk for the identified vulnerabilities through one of the methods listed below. Devices vary in configuration procedures, so please refer to the product user guide for specific instructions.

  • Do not use unpatched clients to connect to the print device Wi-Fi Direct network. Wi-Fi Direct implementation is not impacted, but unpatched mobile devices could be subject to attack when connecting to Wi-Fi Direct

  • Configure the wireless access point or printer to only allow WPA2-AES/CCMP mode, thus disabling WPA-TKIP

  • Use only TLS enabled protocols to communicate with the printer

  • Turning off printer Wi-Fi and using Ethernet or USB

What can you do?

Subscribe to HP real-time security information: All HP products use a common centralized Security Bulletin process managed by HP´s Product Security Response Team (PSRT). Subscribe to HP Security Bulletins by following these steps:

  1. Go to <http://www.hp.com/go/support&gt;.

  2. Click Get software and drivers.

  3. Find your product.

  4. Scroll to the bottom of the page and under Other support resources, clickSign up for driver, support & security alerts.

  5. Follow the onscreen prompts to sign up for alerts.

6.8 Medium

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

5.4 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:M/Au:N/C:P/I:P/A:P