Vulnerability Details : CVE-2022-28722
Certain HP Print Products are potentially vulnerable to Buffer Overflow.
Vulnerability category: Overflow
Products affected by CVE-2022-28722
- cpe:2.3:o:hp:j9v82a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j6u55a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j6u55b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j9v80a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:d3q15a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:d3q17a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:d3q19a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:d3q20a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:d3q21a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:k9z76a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:d3q16a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:p4c78a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t3p03a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j7k33a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f28a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0g25a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j7k34a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f29a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:y0s18a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:y0s19a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:g5j38a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:d9l63a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:d9l64a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0g70a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j3p68a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:d9l18a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j6x76a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j6x80a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:k7s37a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:m9l65a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:m9l70a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:d9l20a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:k7s42a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:d9l21a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j3p65a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j6u57a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j6u51b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:p4c85a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:p4c86a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:p4c81a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:p4c82a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:p4c84a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0g26a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f30a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f32a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f38a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f31a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j7k37a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j7k38a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j7k35a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j7k39a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f36a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f33a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f39a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f34a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f35a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j7k40a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j7k36a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j7k42a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j7k41a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f37a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0f40a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:g5j56a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:l3t99a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t1p99a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j3p66a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j3p67a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:k7s32a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0g65a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:k7s39a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j6x83a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:k7s43a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:k7s40a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:k7s41a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:w1b28a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:y3z45a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:w1b29a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:y3z47a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:y3z57a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:w1b33a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:w1b39a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:w1b37a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:w1b38a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:y3z44a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:a7w93a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:y3z46a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:y3z54a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:w1b31a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:m9l66a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:m9l67a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0g46a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j6x78a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j6x77a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j6x81a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:j6x79a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:k7s38a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0g47a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0g48a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:t0g49a_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-28722
0.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-28722
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-05-27 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2022-28722
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2022-28722
-
https://support.hp.com/us-en/document/ish_6839789-6839813-16/hpsbpi03810
Certain HP Print Products - Potential Buffer Overflow, Remote Code Execution | HP® Customer SupportVendor Advisory
Jump to