HP Company Cyber Security Posture

hp.com

We believe growth and fulfillment through technology is the Future of Work. Our vision is to deliver intelligent solutions that enable growth and more fulfilling work experiences wherever work gets done. Our technology โ€“ a product and service portfolio of personal systems, printers, and 3D printing solutions โ€“ was created to inspire our vision and we are doing everything in our power across climate action, human rights, and digital equity to make it so. We believe thoughtful ideas can come from anyone, anywhere, at any time. And all it takes is one to change the world.

HP Company Details

Linkedin ID:

hp

Employees number:

184122 employees

Number of followers:

5173397.0

NAICS:

541

Industry Type:

IT Services and IT Consulting

Homepage:

hp.com

IP Addresses:

3266

Company ID:

HP_2802015

Scan Status:

In-progress

AI scoreHP Risk Score (AI oriented)

Between 200 and 300

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

HP Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 200 and 300

HP Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
HPVulnerability6034/2025HP909040125Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: A critical security vulnerability was found in Plantronics Hub software, which has been discontinued by HP. Attackers could escalate privileges using an unquoted search path weakness when combined with OpenScape Fusion for MS Office during startup. The vulnerability takes advantage of a flaw in how Windows handles unquoted paths. Attackers with write access to the C:\ directory can plant malicious files that execute with elevated privileges, allowing them to bypass User Account Control and escalate privileges. As OpenScape Fusion launches Plantronics Hub, the malicious code is executed, leading to privilege escalation. HP has not released a patch but recommends quoting the registry path and restricting write permissions to the C:\ directory as mitigation strategies.

HP Company Subsidiaries

SubsidiaryImage

We believe growth and fulfillment through technology is the Future of Work. Our vision is to deliver intelligent solutions that enable growth and more fulfilling work experiences wherever work gets done. Our technology โ€“ a product and service portfolio of personal systems, printers, and 3D printing solutions โ€“ was created to inspire our vision and we are doing everything in our power across climate action, human rights, and digital equity to make it so. We believe thoughtful ideas can come from anyone, anywhere, at any time. And all it takes is one to change the world.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=hp' -H 'apikey: YOUR_API_KEY_HERE'
newsone

HP Cyber Security News

2024-07-29T07:00:00.000Z
Cybersecurity best practices for AI-driven businesses

Protect your AI-driven business data with cybersecurity best practices. Learn how to secure your organization with our HPยฎ Tech Takesย ...

2024-12-16T08:00:00.000Z
Overlooking platform security weakens long-term cybersecurity posture

Platform security โ€“ securing the hardware and firmware of PCs, laptops and printers โ€“ is often overlooked, weakening cybersecurity postureย ...

2025-01-21T08:00:00.000Z
HPE probes hacker claim involving trove of sensitive company data

Hewlett Packard Enterprise said it is investigating claims a threat group gained access to a trove of sensitive company data.

2024-12-14T08:00:00.000Z
HP Study Reveals $8.6bn Cost of Device Security Failures

Research from HP Inc shows businesses face security risks across device lifecycles, with 81% of IT leaders saying hardware security needsย ...

2025-01-19T08:00:00.000Z
Hackers Claim Breach of Hewlett Packard Enterprise, Lists Data for Sale

The notorious IntelBroker hacker along with their associates have claimed responsibility for breaching Hewlett Packard Enterprise (HPE), aย ...

2025-06-04T07:00:00.000Z
The Power of In-House Focus: HP Wolf Securityโ€™s Edge

Find out how HP Wolf Security offers robust protection against cyber threats through its innovative integrated security approach.

2024-12-11T08:00:00.000Z
Cybersecurity Grand Prix: VPNs and a 1-2 Race Finish

In our micro series, the Cybersecurity Grand Prix, we explore the thrill of Formula 1 racing through the lens of Scuderia Ferrari HP,ย ...

2025-02-20T08:00:00.000Z
HP announces a security flaw (and fix) for many laser printers

According to HP, certain LaserJet printers "may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing aย ...

2025-06-25T07:00:00.000Z
BB Professionals: Empowering Enterprises with HP Solutions & Cybersecurity Excellence

Founded in 1990 by visionary leader Ashim Bhasin, this Jaipur-based company has emerged as a cornerstone of IT excellence in Rajasthan,ย ...

similarCompanies

HP Similar Companies

ThunderSoft

ThunderSoft is a provider of operating system technologies, superior products and solutions, experts in mobile, IoT, automotive, and enterprise. Founded in 2008, through ThunderSoftโ€šร„รดs expertise in edge intelligence and operating systems including Android, Linux, Windows and others, a profound mid

NIP Global LTD

NIP Provides IT Solutions Every Country Needs Even after over 20 years in the industry, NIP Global still continues to provide IT solutions that focus on advanced civil registry for population registration as well as government system management solutions. NIP has come a long way since its formation

Infinite Computer Solutions

Infinite is a global technology solution provider headquartered in Rockville, Md. The company provides business technology solutions and product engineering services for telecom, hi-tech, healthcare, media & entertainment, insurance, banking & financial services, retail, public sector, travel and tr

Globant

At Globant, we create the digitally-native products that people love. We bridge the gap between businesses and consumers through technology and creativity, leveraging our experience as an AI powerhouse. We dare to digitally transform organizations and strive to delight their customers. - We have mo

Appen

Appen has been a leader in AI training data for over 25 years, providing high-quality, diverse datasets that power the world's leading AI models. Our end-to-end platform, deep expertise, and scalable human-in-the-loop services enable AI innovators to build and optimize cutting-edge models. We spec

Akkodis

Akkodis is a global digital engineering company and Smart Industry leader. We enable clients to advance in their digital transformation with Talent, Academy, Consulting, and Solutions services. Our 50,000 experts combine best-in-class technologies, R&D, and deep sector know-how for purposeful innova

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

HP CyberSecurity History Information

How many cyber incidents has HP faced?

Total Incidents: According to Rankiteo, HP has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at HP?

Incident Types: The types of cybersecurity incidents that have occurred incident Vulnerability.

How does HP detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Quoting the registry path, Restricting write permissions to the C:\ directory.

Incident Details

Can you provide details on each incident?

Incident : Privilege Escalation

Title: Privilege Escalation Vulnerability in Plantronics Hub Software

Description: A critical security vulnerability was found in Plantronics Hub software, which has been discontinued by HP. Attackers could escalate privileges using an unquoted search path weakness when combined with OpenScape Fusion for MS Office during startup. The vulnerability takes advantage of a flaw in how Windows handles unquoted paths. Attackers with write access to the C:\ directory can plant malicious files that execute with elevated privileges, allowing them to bypass User Account Control and escalate privileges. As OpenScape Fusion launches Plantronics Hub, the malicious code is executed, leading to privilege escalation. HP has not released a patch but recommends quoting the registry path and restricting write permissions to the C:\ directory as mitigation strategies.

Type: Privilege Escalation

Attack Vector: Unquoted Search Path Weakness

Vulnerability Exploited: Unquoted Search Path Weakness in Plantronics Hub

Motivation: Privilege Escalation

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through C:\ directory.

Impact of the Incidents

What was the impact of each incident?

Incident : Privilege Escalation HP909040125

Systems Affected: Plantronics Hub, OpenScape Fusion for MS Office

Which entities were affected by each incident?

Incident : Privilege Escalation HP909040125

Entity Type: Company

Industry: Technology

Response to the Incidents

What measures were taken in response to each incident?

Incident : Privilege Escalation HP909040125

Containment Measures: Quoting the registry path, Restricting write permissions to the C:\ directory

Data Breach Information

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through were Quoting the registry path and Restricting write permissions to the C:\ directory.

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents?

Incident : Privilege Escalation HP909040125

Recommendations: Quote the registry path, Restrict write permissions to the C:\ directory

What recommendations has the company implemented to improve cybersecurity?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Quote the registry path, Restrict write permissions to the C:\ directory.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Privilege Escalation HP909040125

Entry Point: C:\ directory

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Privilege Escalation HP909040125

Root Causes: Unquoted Search Path Weakness

Corrective Actions: Quote the registry path, Restrict write permissions to the C:\ directory

What corrective actions has the company taken based on post-incident analysis?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Quote the registry path, Restrict write permissions to the C:\ directory.

Additional Questions

Impact of the Incidents

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident were Plantronics Hub, OpenScape Fusion for MS Office.

Response to the Incidents

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Quoting the registry path and Restricting write permissions to the C:\ directory.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Quote the registry path, Restrict write permissions to the C:\ directory.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an C:\ directory.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge