Unknown
CVE-2019-6332
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2019-6332
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A potential security vulnerability has been identified with certain HP InkJet printers. The vulnerability could be exploited to allow cross-site scripting (XSS). Affected products and versions include: HP DeskJet 2600 All-in-One Printer series model numbers 4UJ28B, V1N01A – V1N08A, Y5H60A – Y5H80A; HP DeskJet Ink Advantage 2600 All-in-One Printer series model numbers V1N02A – V1N02B, Y5Z00A – Y5Z04B; HP DeskJet Ink Advantage 5000 All-in-One Printer series model numbers M2U86A – M2U89B; HP DeskJet Ink Advantage 5200 All-in-One Printer series model numbers M2U76A – M2U78B; HP ENVY 5000 All-in-One Printer series model numbers M2U85A – M2U85B, M2U91A – M2U94B, Z4A54A – Z4A74A; HP ENVY Photo 6200 All-in-One Printer series model numbers K7G18A-K7G26B, K7S21B, Y0K13D – Y0K15A; HP ENVY Photo 7100 All-in-One Printer series model numbers 3XD89A, K7G93A-K7G99A, Z3M37A – Z3M52A; HP ENVY Photo 7800 All-in-One Printer series model numbers K7R96A, K7S00A – K7S10D, Y0G42D – Y0G52B; HP Ink Tank Wireless 410 series model numbers Z4B53A – Z4B55A, Z6Z95A – Z6Z99A, 4DX94A – 4DX95A, 4YF79A, Z7A01A; HP OfficeJet 5200 All-in-One Printer series model numbers M2U75A, M2U81A-M2U84B, Z4B12A – Z4B14A, Z4B27A – Z4B29A; HP Smart Tank Wireless 450 series model numbers Z4B56A, Z6Z96A – Z6Z98A.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- deskjet 2600 4uj28b firmware,
- deskjet 2600 v1n01a firmware,
- deskjet 2600 v1n08a firmware,
- deskjet 2600 y5h60a firmware,
- deskjet 2600 y5h80a firmware,
- deskjet ink advantage 2600 v1n02a firmware,
- deskjet ink advantage 2600 v1n02b firmware,
- deskjet ink advantage 2600 y5z00a firmware,
- deskjet ink advantage 2600 y5z04b firmware,
- deskjet ink advantage 5000 m2u86a firmware,
- deskjet ink advantage 5000 m2u89b firmware,
- deskjet ink advantage 5200 m2u76a firmware,
- deskjet ink advantage 5200 m2u78b firmware,
- envy 5000 m2u85a firmware,
- envy 5000 m2u85b firmware,
- envy 5000 m2u91a firmware,
- envy 5000 m2u94b firmware,
- envy 5000 z4a54a firmware,
- envy 5000 z4a74a firmware,
- envy photo 6200 k7g18a firmware,
- envy photo 6200 k7g26b firmware,
- envy photo 6200 k7s21b firmware,
- envy photo 6200 y0k13d firmware,
- envy photo 6200 y0k15a firmware,
- envy photo 7100 3xd89a firmware,
- envy photo 7100 k7g93a firmware,
- envy photo 7100 k7g99a firmware,
- envy photo 7100 z3m37a firmware,
- envy photo 7100 z3m52a firmware,
- envy photo 7800 k7r96a firmware,
- envy photo 7800 k7s00a firmware,
- envy photo 7800 k7s10d firmware,
- envy photo 7800 y0g42d firmware,
- envy photo 7800 y0g52b firmware,
- ink tank wireless 410 4dx94a firmware,
- ink tank wireless 410 4dx95a firmware,
- ink tank wireless 410 4yf79a firmware,
- ink tank wireless 410 z4b53a firmware,
- ink tank wireless 410 z4b55a firmware,
- ink tank wireless 410 z6z95a firmware,
- ink tank wireless 410 z6z99a firmware,
- ink tank wireless 410 z7a01a firmware,
- officejet 5200 m2u75a firmware,
- officejet 5200 m2u81a firmware,
- officejet 5200 m2u84b firmware,
- officejet 5200 z4b12a firmware,
- officejet 5200 z4b14a firmware,
- officejet 5200 z4b27a firmware,
- officejet 5200 z4b29a firmware,
- smart tank wireless 450 z4b56a firmware,
- smart tank wireless 450 z6z96a firmware,
- smart tank wireless 450 z6z98a firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: