In the universal printer drivers of the HP company for PCL6 and PostScript, there are critical security gaps that can enable attackers to step in and carry out malicious code, as can be seen from a security notification from HP. Appropriate updates are ready, these should be installed immediately.
The weak points are due to the third-party components used in the driver. The different security gaps are characterized with critical and high risk (CVE-2017-12652 (execution of the harmful malice code, CVSS 9.8, risk “critical”), CVE-2022-2068 (execution of a retained malice code, CVSS 9.8, “critical”), CVE-2023-45853 (information leak, CVSS 9.8 , “Critical”) CVE-2020-14152 (Denial of Service, CVSS 7.1, “High”))).
The universal drivers of HP support thousands of different printer models from the manufacturer and are of course widespread in use. Users can use a List on the part of the HP Check independently whether your own printer is supported.
Current Printer Driver Availability
All versions before the current version 7.3.0.25919 are affected by the weak points. You can get this in different variants directly on the Download page from HP yourself. Old printer entries in the system should be removed after installation, as these are not deleted independently. To ensure that only the current drivers are used after the new facility, administrators should simply remove old entries themselves.
Related Information:
- Test: The best multifunction printer with ink tank in comparison (2025)
- Test: The best color laser multifunctional printers in direct comparison