{"vuid":"VU#377003","idnumber":"377003","name":"Hewlett Packard JetDirect-enabled printers disclose Telnet/HTTP passwords in hex format via \"SNMP READ\" request","keywords":["Hewlett Packard","HP","JetDirect","Telnet","HTTP","password","ASCII","HEX string","SNMP READ"],"overview":"Hewlett Packard (HP) printers store sensitive administrative account information in a variable that is served to any user that makes a certain SNMP request.","clean_desc":"HP JetDirect-enabled printers are configurable via HTTP and Telnet and accept SNMP requests. These printers store the administrative account password in an SNMP variable that can be read by any remote user that knows the address of the printer and the location of the variable. The location of the variable is unchanging.","impact":"Attackers can obtain sensitive information and gain unauthorized access to the printer.","resolution":"Apply a patch Update to firmware version X.22.09 or later.","workarounds":"","sysaffected":"","thanks":"Thanks to Phenoelit for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["h","t","t","p",":","/","/","w","w","w",".","s","e","c","u","r","i","t","y","f","o","c","u","s",".","c","o","m","/","b","i","d","/","5","3","3","1"],"cveids":["CVE-2002-1048"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-07-01T15:51:49Z","publicdate":"2002-07-27T00:00:00Z","datefirstpublished":"2002-09-16T23:38:52Z","dateupdated":"2004-02-23T22:24:41Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"4","cam_easeofexploitation":"20","cam_attackeraccessrequired":"19","cam_scorecurrent":"1.71","cam_scorecurrentwidelyknown":"7.125","cam_scorecurrentwidelyknownexploited":"12.825","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.71,"vulnote":null}