HP
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any HP product.
RSS Feeds for HP security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in HP products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by HP Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 6 vulnerabilities in HP with an average score of 7.8 out of ten. Last year, in 2025 HP had 12 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in HP in 2026 could surpass last years number.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 6 | 7.80 |
| 2025 | 12 | 0.00 |
| 2024 | 40 | 7.99 |
| 2023 | 67 | 8.22 |
| 2022 | 36 | 7.77 |
| 2021 | 14 | 8.09 |
| 2020 | 90 | 8.77 |
| 2019 | 155 | 7.84 |
| 2018 | 76 | 5.74 |
It may take a day or so for new HP vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent HP Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-0754 | Mar 03, 2026 |
Extractable Test Key/Cert on Poly Voice Device: SIP BypassAn embedded test key and certificate could be extracted from a Poly Voice device using specialized reverse engineering tools. This extracted certificate could be accepted by a SIP service provider if the service provider does not perform proper validation of the device certificate. |
|
| CVE-2026-2832 | Feb 20, 2026 |
Samsung MultiXpress Info Disclosure via Unauthenticated APIsCertain Samsung MultiXpress Multifunction Printers may be vulnerable to information disclosure, potentially exposing address book entries and other device configuration information through specific APIs without proper authorization. |
|
| CVE-2026-1578 | Feb 13, 2026 |
XSS in HP App for Android via Outdated VersionHP App for Android is potentially vulnerable to cross-site scripting (XSS) when using an outdated version of the application via mobile devices. HP is releasing updates to mitigate these potential vulnerabilities. |
|
| CVE-2026-1997 | Feb 10, 2026 |
CVE-2026-1997 HP OfficeJet Pro CORS Misconfig Grants UnAuth Cross-Origin AccessCertain HP OfficeJet Pro printers may expose information if CrossOrigin Resource Sharing (CORS) is misconfigured, potentially allowing unauthorized web origins to access device resource. CORS is disabled by default on Proclass devices and can only be enabled by an administrator through the Embedded Web Server (EWS). Keeping CORS disabled unless explicitly required helps ensure that only trusted solutions can interact with the device. |
|
| CVE-2026-1996 | Feb 10, 2026 |
Denial-of-Service via IPP Mishandled Requests in HP OfficeJet Pro PrintersCertain HP OfficeJet Pro printers may be vulnerable to potential denial of service when the IPP requests are mishandled, failing to establish a TCP connection. |
|
| CVE-2019-25305 | Feb 06, 2026 |
JumpStart 0.6.0.0 Unquoted Service Path Vulnerability in jswpbapiJumpStart 0.6.0.0 contains an unquoted service path vulnerability in the jswpbapi service running with LocalSystem privileges. Attackers can exploit the unquoted path containing spaces to inject and execute malicious code with elevated system permissions. |
|
| CVE-2025-14432 | Dec 16, 2025 |
Teams Admin Center Log Exposes Sensitive Data During Config ChangesIn limited scenarios, sensitive data might be written to the log file if an admin uses Microsoft Teams Admin Center (TAC) to make device configuration changes. The affected log file is visible only to users with admin credentials. This is limited to Microsoft TAC and does not affect configuration changes made using the provisioning server or the device WebUI. |
|
| CVE-2025-11761 | Nov 03, 2025 |
HP Client Management Script Library PRIVESC via install script (CVE-2025-11761)A potential security vulnerability has been identified in the HP Client Management Script Library software, which might allow escalation of privilege during the installation process. HP is releasing software updates to mitigate the potential vulnerability. |
|
| CVE-2025-43017 | Oct 28, 2025 |
HP ThinPro 8.1 SP8 System Management App ID Verification VulnerabilityHP ThinPro 8.1 System management application failed to verify user's true id. HP has released HP ThinPro 8.1 SP8, which includes updates to mitigate potential vulnerabilities. |
|
| CVE-2025-10577 | Oct 15, 2025 |
HP Audio Package Sound Research SECOMN64 Driver Privilege EscalationPotential vulnerabilities have been identified in the audio package for certain HP PC products using the Sound Research SECOMN64 driver, which might allow escalation of privilege. HP is releasing updated audio packages to mitigate the potential vulnerabilities |
|
| CVE-2025-10576 | Oct 15, 2025 |
HP Audio SECOMN64 Driver Privilege EscalationPotential vulnerabilities have been identified in the audio package for certain HP PC products using the Sound Research SECOMN64 driver, which might allow escalation of privilege. HP is releasing updated audio packages to mitigate the potential vulnerabilities. |
|
| CVE-2023-6215 | Oct 07, 2025 |
HP Sure Start BIOS Intel Flash Descriptor Vulnerability (CVE-2023-6215)A potential security vulnerability has been identified in HP Sure Starts protection of the Intel Flash Descriptor in certain HP PC products, which might allow security bypass, arbitrary code execution, loss of integrity or confidentiality, or denial of service. HP is releasing BIOS updates to mitigate the potential vulnerability. |
|
| CVE-2025-10578 | Oct 01, 2025 |
hp SA <9.47.41: Local Priv Esc via File WriteA potential security vulnerability has been identified in the HP Support Assistant for versions prior to 9.47.41.0. The vulnerability could potentially allow a local attacker to escalate privileges via an arbitrary file write. |
|
| CVE-2025-10568 | Sep 19, 2025 |
HyperX NGENUITY: arbitrary code exec via softwareHyperX NGENUITY software is potentially vulnerable to arbitrary code execution. HP is releasing updated software to address the potential vulnerability. |
|
| CVE-2024-13980 | Aug 27, 2025 |
H3C Intelligent Management Center (IMC) versions up to and including E0632H07 contains a remote command execution vulnerability in the /byod/index.xhtml endpointH3C Intelligent Management Center (IMC) versions up to and including E0632H07 contains a remote command execution vulnerability in the /byod/index.xhtml endpoint. Improper handling of JSF ViewState allows unauthenticated attackers to craft POST requests with forged javax.faces.ViewState parameters, potentially leading to arbitrary command execution. This flaw does not require authentication and may be exploited without session cookies. An affected version range is undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-08-28 UTC. |
|
| CVE-2025-43023 | Jul 28, 2025 |
HP LIP Weak DSA Signature Key VulnerabilityA potential security vulnerability has been identified in the HP Linux Imaging and Printing Software documentation. This potential vulnerability is due to the use of a weak code signing key, Digital Signature Algorithm (DSA). |
|
| CVE-2025-43026 | Jun 05, 2025 |
HP Support Assistant <9.44.18.0: Local PrivEsc via File WriteA potential security vulnerability has been identified in the HP Support Assistant for versions prior to 9.44.18.0. The vulnerability could potentially allow a local attacker to escalate privileges via an arbitrary file write. |
|
| CVE-2025-1697 | Apr 18, 2025 |
Local Priv Escalation in HP Touchpoint Analytics Service <4.2.2439A potential security vulnerability has been identified in the HP Touchpoint Analytics Service for certain HP PC products with versions prior to 4.2.2439. This vulnerability could potentially allow a local attacker to escalate privileges. HP is providing software updates to mitigate this potential vulnerability. |
|
| CVE-2024-42508 | Oct 18, 2024 |
Auth Info Disclosure CVE-2024-42508This vulnerability could be exploited, leading to unauthorized disclosure of information to authenticated users. |
|
| CVE-2024-42500 | Sep 09, 2024 |
HP-UX NFSv4 DoS VulnerabilityHPE has identified a denial of service vulnerability in HPE HP-UX System's Network File System (NFSv4) services. |
|
| CVE-2024-7720 | Aug 27, 2024 |
HP Security Manager RCE via OpenSource LibsHP Security Manager is potentially vulnerable to Remote Code Execution as a result of code vulnerability within the product's solution open-source libraries. |
|
| CVE-2024-41912 | Aug 07, 2024 |
Poly Clariti Manager Firmware <10.10.2.2 Acct Control FlawA vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly implement access controls. |
|
| CVE-2024-42400 | Aug 06, 2024 |
Unauth DoS in Soft AP Daemon via PAPI Prevents AP FunctionalityMultiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point. |
|
| CVE-2024-42399 | Aug 06, 2024 |
Soft AP daemon PAPI DoS: Unauthenticated exploitationMultiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point. |
|
| CVE-2024-42398 | Aug 06, 2024 |
Unauthenticated DoS via Soft AP PAPI ExploitMultiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point. |
|
| CVE-2024-42393 | Aug 06, 2024 |
Unauthenticated RCE in Soft AP Daemon Service (CVE-2024-42393)There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise. |
|
| CVE-2024-42395 | Aug 06, 2024 |
CVE-2024-42395: AP Cert Mgmt Service Unauth RCEThere is a vulnerability in the AP Certificate Management Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise. |
|
| CVE-2024-42394 | Aug 06, 2024 |
Unauth RCE via Soft AP Daemon ServiceThere are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise. |
|
| CVE-2024-42397 | Aug 06, 2024 |
Cisco AP Certificate Management Daemon DoS via PAPIMultiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point. |
|
| CVE-2024-42396 | Aug 06, 2024 |
Unauthenticated DoS in AP Cert Mgmt Daemon via PAPIMultiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point. |
|
| CVE-2024-41913 | Aug 06, 2024 |
Poly Clariti Manager Firmware <10.10.2.2: Unsanitized User InputA vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly sanitize User input. |
|
| CVE-2024-41911 | Aug 06, 2024 |
Poly Clariti Manager FW <=10.10.2.2 XSS via unescaped input on page renderingA vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The flaw does not properly neutralize input during a web page generation. |
|
| CVE-2024-41910 | Aug 06, 2024 |
Poly Clariti Manager XSS Vulnerable Firmware <=10.10.2.2A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware contained multiple XSS vulnerabilities in the version of JavaScript used. |
|
| CVE-2024-22442 | Jul 16, 2024 |
Authentication Bypass via Remote ExploitThe vulnerability could be remotely exploited to bypass authentication. |
|
| CVE-2024-6147 | Jun 20, 2024 |
Poly Plantronics Hub LPE via Symlink Deletion in Spokes Update ServicePoly Plantronics Hub Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Poly Plantronics Hub. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Spokes Update Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18271. |
|
| CVE-2024-31472 | May 14, 2024 |
Aruba Soft AP Daemon: UDP 8211 CoI Exploits PAPI (CVE-2024-31472)There are command injection vulnerabilities in the underlying Soft AP Daemon service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. |
|
| CVE-2024-31467 | May 14, 2024 |
ArubaAP CLI Buffer Overflow Enables Unauth RCE via PAPI UDPThere are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. |
|
| CVE-2024-31468 | May 14, 2024 |
BF in Aruba Central Comm svc -> unauth RCE via PAPI UDP 8211There are buffer overflow vulnerabilities in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. |
|
| CVE-2024-31469 | May 14, 2024 |
Buffer Overflow in Aruba Central Comm Service (PAPI) UDP 8211 -> RCEThere are buffer overflow vulnerabilities in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. |
|
| CVE-2024-31470 | May 14, 2024 |
Aruba AP SAE Buffer Overflow Enables RCE via PAPI UDPThere is a buffer overflow vulnerability in the underlying SAE (Simultaneous Authentication of Equals) service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. |
|
| CVE-2024-31471 | May 14, 2024 |
CVE-2024-31471 Aruba Central Comm PAPI UDP Command InjectionThere is a command injection vulnerability in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. |
|
| CVE-2024-31483 | May 14, 2024 |
CVE-2024-31483: Authenticated Info Leak via CLI PAPI Service allowing OS file readAn authenticated sensitive information disclosure vulnerability exists in the CLI service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to read arbitrary files in the underlying operating system. |
|
| CVE-2024-31476 | May 14, 2024 |
Authenticated CLI Command Injection Resulting in Privileged OS Code ExecutionMultiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. |
|
| CVE-2024-31479 | May 14, 2024 |
Unauthenticated DoS in Central Communications Service via PAPIUnauthenticated Denial of Service (DoS) vulnerabilities exist in the Central Communications service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service. |
|
| CVE-2024-31478 | May 14, 2024 |
Soft AP Daemon Unauthenticated DoS via PAPIMultiple unauthenticated Denial-of-Service (DoS) vulnerabilities exists in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilites result in the ability to interrupt the normal operation of the affected Access Point. |
|
| CVE-2024-31477 | May 14, 2024 |
Unknown Authenticated CLI Command Injection Enabling Privileged OS Cmd ExecMultiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. |
|
| CVE-2024-31474 | May 14, 2024 |
Aruba AP CLI Arbitrary File Deletion via PAPIThere is an arbitrary file deletion vulnerability in the CLI service accessed by PAPI (Aruba's Access Point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the affected Access Point |
|
| CVE-2024-31473 | May 14, 2024 |
Command injection in Aruba Access Point PAPI UDP 8211 enabling RCEThere is a command injection vulnerability in the underlying deauthentication service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. |
|
| CVE-2024-31482 | May 14, 2024 |
Unauthenticated DoS via ANSI Escape in PAPI ServiceAn unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point. |
|
| CVE-2024-31475 | May 14, 2024 |
Aruba Central Comms: Arbitrary File Delete via PAPIThere is an arbitrary file deletion vulnerability in the Central Communications service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the affected Access Point. |
|