Description
HP JetDirect printers allow remote attackers to obtain the administrative password for the (1) web and (2) telnet services via an SNMP request to the variable (.iso.3.6.1.4.1.11.2.3.9.4.2.1.3.9.1.1.0.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Sven Pechler · textremotehardware
https://www.exploit-db.com/exploits/22319
References (4)
Core 4
Core References
US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/377003
Third Party Advisory vdb-entry
x_refsource_xf
http://www.iss.net/security_center/static/9693.php
Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2002-07/0345.html
Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/5331
Scores
EPSS
0.1028
EPSS Percentile
93.2%
Details
Status
published
Products (13)
hp/jetdirect
j3111a_rev._a.08.06
hp/jetdirect
j3111a_rev._g.05.35
hp/jetdirect
j3111a_rev._g.07.02
hp/jetdirect
j3111a_rev._g.07.03
hp/jetdirect
j3111a_rev._g.07.17
hp/jetdirect
j3111a_rev._g.08.03
hp/jetdirect
x.08.00
hp/jetdirect
x.08.04
hp/jetdirect
x.08.05
hp/jetdirect
x.08.20
... and 3 more
Published
Oct 04, 2002
Tracked Since
Feb 18, 2026