16-year-old flaw haunts millions of HP, Xerox and Samsung printers
The severe vulnerability centres on a printer driver that installs itself on user’s machines, sometimes without their knowledge
Researchers have disclosed a previously undiscovered critical vulnerability in the drivers of millions of printers manufactured by HP, Xerox and Samsung that might allow hackers to take over vulnerable devices.
Tracked as CVE-2021-3438, the highly severe heap buffer overflow flaw has been assigned a CVSS threat severity score of 8.8 out of ten and has been embedded in drivers for printers made since 2005, according to Sentinal Labs.
Security researchers uncover more Print Spooler vulnerabilities HP OfficeJet Pro 8022 review: Good, but not outstanding Best printers 2021: For all your printing, scanning and copying needs
The researchers identified that the vulnerable drivers either came preloaded on devices or that they were silently downloaded when a user installed a legitimate software bundle. For example, some Windows machines might already have this driver without even running a dedicated installation file because the driver comes through Windows Update.
They are also often decades old and developed without concern for the impact on the overall integrity of the systems.
The vulnerability centres on the fact that just by running printer software, the driver gets installed and activated on the machine, regardless of whether a user completes the installation or cancels.
In effect, the driver is installed and loaded without the user necessarily knowing, or regardless of whether a user’s configuring the printer to work wirelessly or through a USB cable. It’ll be loaded by Windows on every boot too, which makes the driver the perfect candidate for hackers to target.
RELATED RESOURCE
Exploiting this kernel driver flaw could lead to an unprivileged user gaining system privileges, and run code in kernel mode - since the driver is locally available to all users. Among the potential abuses are that they could also bypass security products.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Successful exploitation would allow an attacker to install programmes, view, change, encrypt or delete data, or create new accounts with full user privileges. Weaponising this flaw, however, might require chaining several bugs together, and the researchers couldn’t find a means of weaponising the flaw by itself. There’s also no evidence of exploitation in the wild.
Both HP and Xerox have published advisories warning customers about CVE-2021-3438 and urging them to download available patches.
"We constantly monitor the security landscape and value work that helps us identify new potential threats," an HP spokesperson said in a statement. "We have posted a security bulletin here. The security of our customers is always a top priority and we urge all customers to keep their systems up to date."

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Hackers are using LLMs to generate malicious JavaScript in real timeNews Defenders advised to use runtime behavioral analysis to detect and block malicious activity at the point of execution, directly within the browser
-
Developers in India are "catching up fast" on AI-generated codingNews Developers in the United States are leading the world in AI coding practices, at least for now
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Critical Dell Storage Manager flaws could let hackers access sensitive data – patch nowNews A trio of flaws in Dell Storage Manager has prompted a customer alert
-
Blackpoint Cyber and NinjaOne partner to bolster MSP cybersecurityNews The collaboration combines Blackpoint Cyber’s MDR expertise with NinjaOne’s automated endpoint management platform