{"id":663,"date":"2009-02-09T13:56:33","date_gmt":"2009-02-09T12:56:33","guid":{"rendered":"http:\/\/blog.intego.com\/?p=663"},"modified":"2009-02-09T13:56:33","modified_gmt":"2009-02-09T12:56:33","slug":"hp-printers-open-to-unauthorized-access-security-fix-available","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/","title":{"rendered":"HP Printers Open to Unauthorized Access: Security Fix Available"},"content":{"rendered":"<p>It&#8217;s pretty rare that we discuss security issues for hardware devices that don&#8217;t have real operating systems, but Hewlett-Packard has <a href=\"http:\/\/h20000.www2.hp.com\/bizsupport\/TechSupport\/Document.jsp?objectID=c01623905\">published a security bulletin<\/a> about a security issue with a number of their printers. To quote the bulletin, &#8220;A potential security vulnerability has been identified with certain HP LaserJet printers, HP Color LaserJet printers and HP Digital Senders. The vulnerability could be exploited remotely to gain unauthorized access to files.&#8221;<\/p>\n<p>This affects a number of HP printers, and the security bulletin lists the models affected and the firmware versions necessary to patch the vulnerability. Downloads are not available from that page, so you&#8217;ll need to click the &#8220;Download drivers and software&#8221; link and choose your model to get the right driver.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s pretty rare that we discuss security issues for hardware devices that don&#8217;t have real operating systems, but Hewlett-Packard has published a security bulletin about a security issue with a number of their printers. To quote the bulletin, &#8220;A potential security vulnerability has been identified with certain HP LaserJet printers, HP Color LaserJet printers and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"It&#039;s pretty rare that we discuss security issues for hardware devices that don&#039;t have real operating systems, but Hewlett-Packard has published a security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HP Printers Open to Unauthorized Access: Security Fix Available - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"It&#039;s pretty rare that we discuss security issues for hardware devices that don&#039;t have real operating systems, but Hewlett-Packard has published a security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-02-09T12:56:33+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/\",\"name\":\"HP Printers Open to Unauthorized Access: Security Fix Available - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2009-02-09T12:56:33+00:00\",\"dateModified\":\"2009-02-09T12:56:33+00:00\",\"description\":\"It's pretty rare that we discuss security issues for hardware devices that don't have real operating systems, but Hewlett-Packard has published a security\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HP Printers Open to Unauthorized Access: Security Fix Available\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"HP Printers Open to Unauthorized Access: Security Fix Available\",\"datePublished\":\"2009-02-09T12:56:33+00:00\",\"dateModified\":\"2009-02-09T12:56:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/#webpage\"},\"wordCount\":130,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"It's pretty rare that we discuss security issues for hardware devices that don't have real operating systems, but Hewlett-Packard has published a security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/","og_locale":"en_US","og_type":"article","og_title":"HP Printers Open to Unauthorized Access: Security Fix Available - The Mac Security Blog","og_description":"It's pretty rare that we discuss security issues for hardware devices that don't have real operating systems, but Hewlett-Packard has published a security","og_url":"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-02-09T12:56:33+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/","name":"HP Printers Open to Unauthorized Access: Security Fix Available - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2009-02-09T12:56:33+00:00","dateModified":"2009-02-09T12:56:33+00:00","description":"It's pretty rare that we discuss security issues for hardware devices that don't have real operating systems, but Hewlett-Packard has published a security","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"HP Printers Open to Unauthorized Access: Security Fix Available"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"HP Printers Open to Unauthorized Access: Security Fix Available","datePublished":"2009-02-09T12:56:33+00:00","dateModified":"2009-02-09T12:56:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hp-printers-open-to-unauthorized-access-security-fix-available\/#webpage"},"wordCount":130,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-aH","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/663"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=663"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/663\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}