-
1
×InformationNeed Windows 11 help?Check documents on compatibility, FAQs, upgrade information and available fixes.
Windows 11 Support Center. -
-
1
×InformationNeed Windows 11 help?Check documents on compatibility, FAQs, upgrade information and available fixes.
Windows 11 Support Center. -
- HP Community
- Printers
- Scanning, Faxing, and Copying
- TLS Protocol Session Renegotiation Security Vulnerability

Create an account on the HP Community to personalize your profile and ask a question
07-30-2024 03:56 AM
Hello all,
I have asked this before and didn't get an answer other than to contact support. I cannot get support as a lot of the printers for our clients are out of warranty and they do not have a vendor to refer to.
I have dozens of Laserjet printers that are showing up on Qualys scans that the TLS renegotiation is a vulnerability.
I have tried disabling the weaker TLS versions and also updated the printers to the latest firmware available but still, the scan returns hits on these printers, Much appreciate if anyone could advice on this.
07-30-2024 01:52 PM
Hi @louisy86,
Welcome to the HP Support Community
I understand you are facing an issue with your HP Product. Not to worry I will help you to get a resolution to resolve the issue.
To assist better:
- May I have the exact name of the model of the product? Refer to this document for steps to find the product details. Do not share your personal information such as serial, phone number, email ID, etc.
Could you please elaborate in detail?
I hope this helps! Keep me posted.
Please click “Accepted Solution” if you feel my post solved your issue, it will help others find the solution.
A_Gayathri
HP Support Community Administrator.
07-30-2024 10:33 PM
HI Gaya,
There are ton of vulnerability finding at HP LaserJet printer from Qualys Scan.
The QID 38596 - TLS Protocol Session Renegotiation Security Vulnerability and the affected CVE-2009-3555.
The scan result - Number of SSL renegotiations:1#
Action being taken on one of the affected Printer HP Laserjet M506.
1. Updated to the latest firmware
2. Disable TLS 1.0 ,1.2
2. Use TLS 1.2 only.
However the printer is still flag on this finding after the qualys scanned.
Much appreciate if your kind assistance and advice.
07-31-2024 04:28 PM
According to documentation printed in 2019, HP addressed this issue with firmware starting after Revision 4.7.2 of firmware.
The IETF developed a new negotiation method (RFC5746, in February 2010) to address the vulnerability and fail a handshake with any devices that were unable to use the new method. HP implemented the new method and created an Object Identifier (OID) in SNMP to enable/disable the enforcement of the new method. The default setting was to allow negotiation with printers which presented or responded with the Legacy method. However, this default setting changed in FutureSmart bundle firmware version 4.7.2. HP Enterprise printers will no longer allow negotiation with systems that use the Legacy method.
Do you have SNMP 3 configured or an older version?
I am a volunteer, offering my knowledge to support fellow users, I do not work for HP nor speak for HP.
07-31-2024 11:58 PM
You might want to contact HP regarding their JetAdvantage Security Manager software. It will examine your fleet, flag configuration and security issues and will even apply policies to printers. It can be configured to push security settings to new printers as soon as they are attached to the network or re-apply settings in cases of corruption.
I am a volunteer, offering my knowledge to support fellow users, I do not work for HP nor speak for HP.