IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

16-year-old flaw haunts millions of HP, Xerox and Samsung printers

The severe vulnerability centres on a printer driver that installs itself on user’s machines, sometimes without their knowledge

Researchers have disclosed a previously undiscovered critical vulnerability in the drivers of millions of printers manufactured by HP, Xerox and Samsung that might allow hackers to take over vulnerable devices.

Tracked as CVE-2021-3438, the highly severe heap buffer overflow flaw has been assigned a CVSS threat severity score of 8.8 out of ten and has been embedded in drivers for printers made since 2005, according to Sentinal Labs. 

The researchers identified that the vulnerable drivers either came preloaded on devices or that they were silently downloaded when a user installed a legitimate software bundle. For example, some Windows machines might already have this driver without even running a dedicated installation file because the driver comes through Windows Update. 

They are also often decades old and developed without concern for the impact on the overall integrity of the systems. 

The vulnerability centres on the fact that just by running printer software, the driver gets installed and activated on the machine, regardless of whether a user completes the installation or cancels. 

In effect, the driver is installed and loaded without the user necessarily knowing, or regardless of whether a user’s configuring the printer to work wirelessly or through a USB cable. It’ll be loaded by Windows on every boot too, which makes the driver the perfect candidate for hackers to target.

Related Resource

ITIL 4 in ten minutes

A quickstart guide to the latest ITSM framework

Smiling businesswoman holding phone - whitepaper from ServiceNowFree download

Exploiting this kernel driver flaw could lead to an unprivileged user gaining system privileges, and run code in kernel mode - since the driver is locally available to all users. Among the potential abuses are that they could also bypass security products

Successful exploitation would allow an attacker to install programmes, view, change, encrypt or delete data, or create new accounts with full user privileges. Weaponising this flaw, however, might require chaining several bugs together, and the researchers couldn’t find a means of weaponising the flaw by itself. There’s also no evidence of exploitation in the wild. 

Both HP and Xerox have published advisories warning customers about CVE-2021-3438 and urging them to download available patches. 

"We constantly monitor the security landscape and value work that helps us identify new potential threats," an HP spokesperson said in a statement. "We have posted a security bulletin here. The security of our customers is always a top priority and we urge all customers to keep their systems up to date."

Featured Resources

2022 State of the multi-cloud report

What are the biggest multi-cloud motivations for decision-makers, and what are the leading challenges

Free Download

The Total Economic Impact™ of IBM robotic process automation

Cost savings and business benefits enabled by robotic process automation

Free Download

Multi-cloud data integration for data leaders

A holistic data-fabric approach to multi-cloud integration

Free Download

MLOps and trustworthy AI for data leaders

A data fabric approach to MLOps and trustworthy AI

Free Download

Most Popular

The top 12 password-cracking techniques used by hackers

The top 12 password-cracking techniques used by hackers

14 Nov 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

15 Nov 2022
Interpol arrests nearly 1,000 cyber criminals in months-long anti-fraud operation
cyber crime

Interpol arrests nearly 1,000 cyber criminals in months-long anti-fraud operation

25 Nov 2022