// For flags

CVE-2024-1223

Improper authorization controls in PaperCut NG/MF

Severity Score

4.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.

Esta vulnerabilidad permite potencialmente la enumeración no autorizada de información de las API del dispositivo integrado. Un atacante ya debe tener conocimiento de alguna combinación de nombres de usuario válidos, nombres de dispositivos y una clave interna del sistema. Para que un ataque de este tipo tenga éxito, el sistema debe estar en un estado de ejecución específico.

This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the configuration of a VendorKeys object. The issue results from the use of hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication on the External Devices API.

*Credits: Ahmed Y. Elmogy
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-02-05 CVE Reserved
  • 2024-03-14 CVE Published
  • 2024-06-19 EPSS Updated
  • 2024-09-26 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-488: Exposure of Data Element to Wrong Session
CAPEC
  • CAPEC-131: Resource Leak Exposure
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
PaperCut
Search vendor "PaperCut"
PaperCut NG, PaperCut MF
Search vendor "PaperCut" for product "PaperCut NG, PaperCut MF"
< 23.0.7
Search vendor "PaperCut" for product "PaperCut NG, PaperCut MF" and version " < 23.0.7"
en
Affected
PaperCut
Search vendor "PaperCut"
PaperCut NG, PaperCut MF
Search vendor "PaperCut" for product "PaperCut NG, PaperCut MF"
< 22.1.5
Search vendor "PaperCut" for product "PaperCut NG, PaperCut MF" and version " < 22.1.5"
en
Affected
PaperCut
Search vendor "PaperCut"
PaperCut NG, PaperCut MF
Search vendor "PaperCut" for product "PaperCut NG, PaperCut MF"
< 21.2.14
Search vendor "PaperCut" for product "PaperCut NG, PaperCut MF" and version " < 21.2.14"
en
Affected
PaperCut
Search vendor "PaperCut"
PaperCut NG, PaperCut MF
Search vendor "PaperCut" for product "PaperCut NG, PaperCut MF"
< 20.1.10
Search vendor "PaperCut" for product "PaperCut NG, PaperCut MF" and version " < 20.1.10"
en
Affected