Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2011-4161
PUBLISHED
More InfoOfficial Page
Assigner-hp
Assigner Org ID-74586083-13ce-40fd-b46a-8e5d23cfbcb2
View Known Exploited Vulnerability (KEV) details
Published At-01 Dec, 2011 | 21:00
Updated At-07 Aug, 2024 | 00:01
Rejected At-
▼CVE Numbering Authority (CNA)

The default configuration of the HP CM8060 Color MFP with Edgeline; Color LaserJet 3xxx, 4xxx, 5550, 9500, CMxxxx, CPxxxx, and Enterprise CPxxxx; Digital Sender 9200c and 9250c; LaserJet 4xxx, 5200, 90xx, Mxxxx, and Pxxxx; and LaserJet Enterprise 500 color M551, 600, M4555 MFP, and P3015 enables the Remote Firmware Update (RFU) setting, which allows remote attackers to execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.kb.cert.org/vuls/id/717921
third-party-advisory
x_refsource_CERT-VN
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03102449
vendor-advisory
x_refsource_HP
http://isc.sans.org/diary/Hacking+HP+Printers+for+Fun+and+Profit/12112
x_refsource_MISC
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03102449
vendor-advisory
x_refsource_HP
http://redtape.msnbc.msn.com/_news/2011/11/29/9076395-exclusive-millions-of-printers-open-to-devastating-hack-attack-researchers-say
x_refsource_MISC
http://secunia.com/advisories/47063
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1026357
vdb-entry
x_refsource_SECTRACK
http://www.securityfocus.com/bid/51324
vdb-entry
x_refsource_BID
https://lists.immunityinc.com/pipermail/dailydave/2011-November/000378.html
mailing-list
x_refsource_MLIST
Hyperlink: http://www.kb.cert.org/vuls/id/717921
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03102449
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://isc.sans.org/diary/Hacking+HP+Printers+for+Fun+and+Profit/12112
Resource:
x_refsource_MISC
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03102449
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://redtape.msnbc.msn.com/_news/2011/11/29/9076395-exclusive-millions-of-printers-open-to-devastating-hack-attack-researchers-say
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/47063
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1026357
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securityfocus.com/bid/51324
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://lists.immunityinc.com/pipermail/dailydave/2011-November/000378.html
Resource:
mailing-list
x_refsource_MLIST
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.kb.cert.org/vuls/id/717921
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03102449
vendor-advisory
x_refsource_HP
x_transferred
http://isc.sans.org/diary/Hacking+HP+Printers+for+Fun+and+Profit/12112
x_refsource_MISC
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03102449
vendor-advisory
x_refsource_HP
x_transferred
http://redtape.msnbc.msn.com/_news/2011/11/29/9076395-exclusive-millions-of-printers-open-to-devastating-hack-attack-researchers-say
x_refsource_MISC
x_transferred
http://secunia.com/advisories/47063
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1026357
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securityfocus.com/bid/51324
vdb-entry
x_refsource_BID
x_transferred
https://lists.immunityinc.com/pipermail/dailydave/2011-November/000378.html
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/717921
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03102449
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://isc.sans.org/diary/Hacking+HP+Printers+for+Fun+and+Profit/12112
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03102449
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://redtape.msnbc.msn.com/_news/2011/11/29/9076395-exclusive-millions-of-printers-open-to-devastating-hack-attack-researchers-say
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/47063
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1026357
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securityfocus.com/bid/51324
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://lists.immunityinc.com/pipermail/dailydave/2011-November/000378.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Details not found