The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-3438

CVE-2021-3438: HP Color Laser 150 Privilege Escalation

CVE-2021-3438 is a privilege escalation vulnerability in HP Color Laser 150 4ZB94A printers caused by a buffer overflow in software drivers. This article covers the technical details, affected versions, impact, and mitigation.

Published: March 4, 2026

CVE-2021-3438 Overview

CVE-2021-3438 is a buffer overflow vulnerability affecting the software drivers for certain HP LaserJet products and Samsung product printers. This local privilege escalation flaw exists within the print driver software that is installed on Windows systems when these printers are configured. A successful exploit of this vulnerability could allow an attacker with low privileges on the local system to escalate their privileges to SYSTEM level, gaining complete control over the affected host.

The vulnerability has significant implications for enterprise environments where these printer models are widely deployed. Since printer drivers often run with elevated privileges and are installed on numerous workstations and servers, this vulnerability presents an attractive target for attackers who have already gained initial access to a network and are looking to escalate privileges for lateral movement or persistence.

Critical Impact

Local attackers can exploit this buffer overflow in HP and Samsung printer drivers to escalate privileges to SYSTEM level, potentially compromising entire enterprise networks through widely deployed printing infrastructure.

Affected Products

  • HP LaserJet MFP Series (M42523, M42625, M433, M436, M437, M438, M439, M440, M442, M443, M72625-M72630)
  • HP Color Laser Series (150, MFP 170) and HP Laser Series (100, 408, MFP 130, MFP 432)
  • Samsung Xpress, ProXpress, MultiXpress, CLP, CLX, ML, SCX, and SF Series Printers

Discovery Timeline

  • May 20, 2021 - CVE-2021-3438 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2021-3438

Vulnerability Analysis

This buffer overflow vulnerability (CWE-120: Buffer Copy without Checking Size of Input) exists in the Windows print driver software distributed with HP LaserJet and Samsung printer products. The vulnerability is classified as a local privilege escalation issue, meaning an attacker must already have local access to the system to exploit it.

The driver processes certain input without properly validating the size of the data being copied into a fixed-size buffer. When malformed or oversized input is provided, it overflows the buffer boundaries, potentially overwriting adjacent memory. Because printer drivers typically execute with elevated privileges (often SYSTEM-level) to interface with hardware, successful exploitation allows the attacker to execute arbitrary code in this privileged context.

This vulnerability requires local access and low privileges to exploit, with no user interaction required. A successful attack can result in complete compromise of confidentiality, integrity, and availability of the affected system.

Root Cause

The root cause of CVE-2021-3438 is a classic buffer overflow condition (CWE-120) where the printer driver software copies data into a buffer without adequately checking whether the input size exceeds the buffer's allocated capacity. This insufficient bounds checking allows attackers to write beyond the intended memory boundaries.

The affected driver code fails to validate the length of user-controlled input before copying it into a stack or heap buffer. This missing size validation is a common programming error in C/C++ code where manual memory management is required, and it represents a failure to implement proper defensive programming practices.

Attack Vector

The attack is executed locally on systems where the vulnerable printer drivers are installed. An attacker who has gained initial access to a workstation or server (through phishing, social engineering, or another vulnerability) can target this driver vulnerability to elevate from a standard user account to SYSTEM privileges.

The exploitation flow involves sending specially crafted data to the printer driver's processing routines, triggering the buffer overflow condition. The overflow corrupts memory in a controlled manner, allowing the attacker to redirect execution flow to their payload. Since the driver operates with elevated privileges, the attacker's code executes with those same privileges, achieving privilege escalation.

Because no user interaction is required and the attack complexity is low, this vulnerability is particularly dangerous in environments where the vulnerable drivers are widely installed. The attacker simply needs local access to the system—which could be achieved through an unprivileged user account or a compromised application—to escalate to full system control.

Detection Methods for CVE-2021-3438

Indicators of Compromise

  • Unexpected crashes or blue screens (BSOD) involving printer driver components or spooler services
  • Anomalous process creation from spoolsv.exe or printer-related driver processes with unusual command lines
  • New privileged accounts or unexpected privilege changes following printer driver activity

Detection Strategies

  • Monitor Windows Event Logs for driver loading events and crashes related to HP or Samsung printer drivers
  • Use endpoint detection and response (EDR) solutions to detect privilege escalation attempts from low-privilege processes targeting driver components
  • Implement file integrity monitoring on printer driver directories to detect unauthorized modifications

Monitoring Recommendations

  • Enable verbose logging for the Print Spooler service and monitor for unusual activity patterns
  • Configure SIEM rules to alert on privilege escalation events following interactions with print subsystem components
  • Regularly audit installed printer drivers across the enterprise to identify vulnerable versions

How to Mitigate CVE-2021-3438

Immediate Actions Required

  • Inventory all HP LaserJet and Samsung printers in the environment and identify systems with installed drivers
  • Download and apply the latest driver updates from HP Support immediately
  • Remove unnecessary printer drivers from systems that do not require them

Patch Information

HP has released updated printer drivers that address this vulnerability. Affected organizations should obtain the patched drivers from the HP Security Advisory and deploy them across all affected systems. The patch corrects the buffer size validation logic to prevent the overflow condition.

For Samsung printer products (many of which are now supported by HP following their acquisition of Samsung's printer business), updated drivers are available through the same HP support channels. Organizations should verify that their specific printer model and driver version are covered by the update.

Workarounds

  • Restrict local logon rights to minimize the number of users who could potentially exploit this vulnerability
  • Implement application whitelisting to prevent unauthorized code execution even if privilege escalation occurs
  • Consider network-based printing solutions that minimize the need for local driver installations on workstations
bash
# Identify installed HP/Samsung printer drivers on Windows systems
wmic printer get name,drivername | findstr /i "HP Samsung"

# Check driver version information (PowerShell)
Get-PrinterDriver | Where-Object {$_.Name -match "HP|Samsung"} | Select-Object Name, PrinterEnvironment, MajorVersion, MinorVersion

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechHp

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.42%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-120
  • Vendor Resources
  • HP Security Document
  • Related CVEs
  • CVE-2021-39298: HP Z1 Entry Tower G5 Privilege Escalation

  • CVE-2024-5477: HP System BIOS Privilege Escalation Flaw

  • CVE-2022-37018: HP Z1 G3 BIOS Privilege Escalation Flaw

  • CVE-2023-5410: HP PC BIOS Privilege Escalation Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English