Attacker Value
Unknown
0
CVE-2022-28722
0
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-28722
(Last updated October 08, 2023) ▾
MITRE ATT&CK
Log in to add MITRE ATT&CK tag
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
MITRE ATT&CK
Select the MITRE ATT&CK Tactics that apply to this CVE
Collection
Select any Techniques used:
Command and Control
Select any Techniques used:
Credential Access
Select any Techniques used:
Defense Evasion
Select any Techniques used:
Discovery
Select any Techniques used:
Execution
Select any Techniques used:
Exfiltration
Select any Techniques used:
Impact
Select any Techniques used:
Initial Access
Select any Techniques used:
Lateral Movement
Select any Techniques used:
Persistence
Select any Techniques used:
Privilege Escalation
Select any Techniques used:
Topic Tags
Select the tags that apply to this CVE (Assessment added tags are disabled and cannot be removed)
What makes this of high-value to an attacker?
What makes this of low-value to an attacker?
Description
Certain HP Print Products are potentially vulnerable to Buffer Overflow.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
Data provided by the National Vulnerability Database (NVD)
Base Score:
9.8 Critical
Impact Score:
5.9
Exploitability Score:
3.9
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High
General Information
Offensive Application
Unknown
Utility Class
Unknown
Ports
Unknown
OS
Unknown
Vulnerable Versions
Certain HP inkjet printers, HP LaserJet Pro printers, HP PageWide Pro printers Multiple
Prerequisites
Unknown
Discovered By
Unknown
PoC Author
Unknown
Metasploit Module
Unknown
Reporter
Unknown
Vendors
Products
- a7w93a firmware,
- d3q15a firmware,
- d3q16a firmware,
- d3q17a firmware,
- d3q19a firmware,
- d3q20a firmware,
- d3q21a firmware,
- d9l18a firmware,
- d9l20a firmware,
- d9l21a firmware,
- d9l63a firmware,
- d9l64a firmware,
- g5j38a firmware,
- g5j56a firmware,
- j3p65a firmware,
- j3p66a firmware,
- j3p67a firmware,
- j3p68a firmware,
- j6u51b firmware,
- j6u55a firmware,
- j6u55b firmware,
- j6u57a firmware,
- j6x76a firmware,
- j6x77a firmware,
- j6x78a firmware,
- j6x79a firmware,
- j6x80a firmware,
- j6x81a firmware,
- j6x83a firmware,
- j7k33a firmware,
- j7k34a firmware,
- j7k35a firmware,
- j7k36a firmware,
- j7k37a firmware,
- j7k38a firmware,
- j7k39a firmware,
- j7k40a firmware,
- j7k41a firmware,
- j7k42a firmware,
- j9v80a firmware,
- j9v82a firmware,
- k7s32a firmware,
- k7s37a firmware,
- k7s38a firmware,
- k7s39a firmware,
- k7s40a firmware,
- k7s41a firmware,
- k7s42a firmware,
- k7s43a firmware,
- k9z76a firmware,
- l3t99a firmware,
- m9l65a firmware,
- m9l66a firmware,
- m9l67a firmware,
- m9l70a firmware,
- p4c78a firmware,
- p4c81a firmware,
- p4c82a firmware,
- p4c84a firmware,
- p4c85a firmware,
- p4c86a firmware,
- t0f28a firmware,
- t0f29a firmware,
- t0f30a firmware,
- t0f31a firmware,
- t0f32a firmware,
- t0f33a firmware,
- t0f34a firmware,
- t0f35a firmware,
- t0f36a firmware,
- t0f37a firmware,
- t0f38a firmware,
- t0f39a firmware,
- t0f40a firmware,
- t0g25a firmware,
- t0g26a firmware,
- t0g46a firmware,
- t0g47a firmware,
- t0g48a firmware,
- t0g49a firmware,
- t0g65a firmware,
- t0g70a firmware,
- t1p99a firmware,
- t3p03a firmware,
- w1b28a firmware,
- w1b29a firmware,
- w1b31a firmware,
- w1b33a firmware,
- w1b37a firmware,
- w1b38a firmware,
- w1b39a firmware,
- y0s18a firmware,
- y0s19a firmware,
- y3z44a firmware,
- y3z45a firmware,
- y3z46a firmware,
- y3z47a firmware,
- y3z54a firmware,
- y3z57a firmware
References
Additional Info
Authenticated
Unknown
Exploitable
Unknown
Reliability
Unknown
Stability
Unknown
Available Mitigations
Unknown
Shelf Life
Unknown
Userbase/Installbase
Unknown
Patch Effectiveness
Unknown
Rapid7
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: