A printer driver shipped to millions of computers since 2005 is affected by a vulnerability that can be exploited for privilege escalation, according to endpoint security company SentinelOne.
The vulnerability was initially discovered earlier this year in a driver shipped with HP printers, but a closer analysis revealed that the impacted component has also been delivered with Samsung and Xerox devices. The problematic driver was developed based on open source driver samples made available by Microsoft, but the vulnerability does not appear to exist in the original sample.
HP has listed more than 380 HP and Samsung printer models affected by the flaw — HP acquired Samsung’s printer business in 2017. Xerox has identified a dozen printer models affected by the vulnerability.
HP and Xerox have released patches for the vulnerability, and consumers and enterprises have been advised to install them.
The security hole is tracked as CVE-2021-3438 and it has been assigned a high severity rating (CVSS score of 8.8).
According to SentinelOne, the vulnerability allows an attacker who has low privileges on the targeted computer to escalate permissions to SYSTEM and execute code, which the company says can be useful for bypassing security products, as well as other purposes.
“Successfully exploiting a driver vulnerability might allow attackers to potentially install programs, view, change, encrypt or delete data, or create new accounts with full user rights,” SentinelOne said. “Weaponizing this vulnerability might require chaining other bugs as we didn’t find a way to weaponize it by itself given the time invested.”
The company said it had not seen any evidence to suggest that the vulnerability has been exploited in the wild, but noted that “with millions of printer models currently vulnerable, it is inevitable that if attackers weaponize this vulnerability they will seek out those that have not taken the appropriate action.”
SentinelOne has published a blog post with technical information about the vulnerability.
Related: Windows Admins Scrambling to Contain ‘PrintNightmare’ Flaw Exposure
Related: Code Execution Flaw Found in HP Enterprise Printers
Related: HP Offering Big Rewards for Cartridge Vulnerabilities

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
Latest News
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- UK Car Retailer Arnold Clark Hit by Ransomware
- Dealing With the Carcinization of Security
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023 | Regulations
