CVE-2025-26506
Published: 14 February 2025
Summary
CVE-2025-26506 is a critical-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Hp 499Q9E Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 16.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely identification, reporting, and patching of the stack-based buffer overflow flaw in PostScript processing on affected HP printers.
Mandates validation of PostScript print job inputs to detect and reject malformed data that could trigger the buffer overflow leading to RCE.
Implements memory protections such as stack guards or DEP that can mitigate exploitation of the stack-based buffer overflow even if input validation fails.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The unauthenticated network-accessible stack-based buffer overflow in PostScript processing directly enables remote exploitation of a public-facing printer service (T1190) and achieves RCE with privilege escalation (T1068).
NVD Description
Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job.
Deeper analysisAI
CVE-2025-26506 is a critical vulnerability enabling remote code execution (RCE) and elevation of privilege in certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers. It occurs when processing a PostScript print job and stems from CWE-121 (stack-based buffer overflow). Published on 2025-02-14, the issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its high severity due to network accessibility and lack of prerequisites.
An unauthenticated attacker with network access to the printer can exploit the vulnerability by sending a malicious PostScript print job. No user interaction or privileges are required, allowing low-complexity exploitation that achieves RCE and privilege escalation, compromising confidentiality, integrity, and availability of the device.
The HP security bulletin at https://support.hp.com/us-en/document/ish_11953771-11953793-16/hpsbpi04007 provides details on mitigation, including affected models and recommended patches or workarounds.
Details
- CWE(s)