16-year-old flaw haunts millions of HP, Xerox and Samsung printers
The severe vulnerability centres on a printer driver that installs itself on user’s machines, sometimes without their knowledge


Researchers have disclosed a previously undiscovered critical vulnerability in the drivers of millions of printers manufactured by HP, Xerox and Samsung that might allow hackers to take over vulnerable devices.
Tracked as CVE-2021-3438, the highly severe heap buffer overflow flaw has been assigned a CVSS threat severity score of 8.8 out of ten and has been embedded in drivers for printers made since 2005, according to Sentinal Labs.
Security researchers uncover more Print Spooler vulnerabilities HP OfficeJet Pro 8022 review: Good, but not outstanding Best printers 2021: For all your printing, scanning and copying needs
The researchers identified that the vulnerable drivers either came preloaded on devices or that they were silently downloaded when a user installed a legitimate software bundle. For example, some Windows machines might already have this driver without even running a dedicated installation file because the driver comes through Windows Update.
They are also often decades old and developed without concern for the impact on the overall integrity of the systems.
The vulnerability centres on the fact that just by running printer software, the driver gets installed and activated on the machine, regardless of whether a user completes the installation or cancels.
In effect, the driver is installed and loaded without the user necessarily knowing, or regardless of whether a user’s configuring the printer to work wirelessly or through a USB cable. It’ll be loaded by Windows on every boot too, which makes the driver the perfect candidate for hackers to target.
RELATED RESOURCE
Exploiting this kernel driver flaw could lead to an unprivileged user gaining system privileges, and run code in kernel mode - since the driver is locally available to all users. Among the potential abuses are that they could also bypass security products.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Successful exploitation would allow an attacker to install programmes, view, change, encrypt or delete data, or create new accounts with full user privileges. Weaponising this flaw, however, might require chaining several bugs together, and the researchers couldn’t find a means of weaponising the flaw by itself. There’s also no evidence of exploitation in the wild.
Both HP and Xerox have published advisories warning customers about CVE-2021-3438 and urging them to download available patches.
"We constantly monitor the security landscape and value work that helps us identify new potential threats," an HP spokesperson said in a statement. "We have posted a security bulletin here. The security of our customers is always a top priority and we urge all customers to keep their systems up to date."

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard Published
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott Published
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz Published
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz Published
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz Published
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott Published
-
A critical Ivanti flaw is being exploited in the wild – here’s what you need to know
News Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances
By Solomon Klappholz Published
-
Researchers claim an AMD security flaw could let hackers access encrypted data
News Using only a $10 test rig, researchers were able to pull off the badRAM attack
By Solomon Klappholz Published
-
Busting nine myths about file-based threats
Whitepaper Distinguish the difference between fact and fiction when it comes to preventing file-based threats
By ITPro Published