Skip to content
an image of the word threat in focus of a magnifying glass with binary code lines in the background

Cybersecurity Quick Tip: Some HP, Samsung, and Xerox Printers Vulnerable to Security Flaw

This article is for informational purposes only. It is not intended to be used in place of professional advice, treatment, or care in any way. Lawyers, law students, judges, and other legal professionals in Massachusetts can find more on scheduling a Free & Confidential appointment with a licensed clinician here.

Legal IT experts at Sensei Enterprises shared news last week about an old security flaw affecting millions of printers.


Lawyers using HP, Samsung, or Xerox printers need to find out whether yours is among those that are running a vulnerable driver — and apply the update if so. From John Simek at the Sensei Enterprises IT Blog:

When it comes to updating software, don’t forget about other devices such as printers, monitors or router firmware. Case in point – SentinelLabs has discovered a 16-year-old vulnerability that has existed in a vulnerable printer driver for millions of HP, Samsung and Xerox printers. The vulnerability is a buffer overflow (CVE-2021-3438) in the SSPORT.SYS driver for specific printer models that could lead to a local escalation of user privileges. The list of impacted printers includes over 380 HP and Samsung models and at least a dozen Xerox models. A list of printers running the vulnerable driver can be found in HP’s security advisory and this Xerox security mini bulletin.

Obviously, if you have a printer running the vulnerable driver, apply the update now.

Email: Phone: 703.359.0700
Digital Forensics/Cybersecurity/Information Technology


Our gratitude to the NCBA Center for Practice Management for circulating this via their helpful ICYMI newsletter.



More Cybersecurity posts on Mass LOMAP


   Free & Confidential Consultations:

Lawyers, law students, and judges in Massachusetts can discuss concerns with a law practice advisor, licensed therapist, or both. Find more on scheduling here.

CATEGORIES: Ethics | Technology
TAGS: cybersecurity / data security / protection

Share This

Related Posts

Back To Top