![]() How do I find potentially vulnerable PaperCut services with runZero?įrom the Services inventory, use the following prebuilt query to locate all PaperCut MF and NG servers in your network: _asset.protocol:http and protocol:http and (http.body:"PaperCut MF is a print management system" OR :"PaperCut MF is a print management system" OR http.body:"PaperCut NG is a print management system" OR :"PaperCut NG is a print management system")Īs always, any prebuilt queries are available from your runZero console. ![]() Older unsupported/end-of-life versions will not be receiving a patched update.įor admins who cannot patch immediately, PaperCut does provide a mitigation for CVE-2023-27351/ZDI-CAN-19226, but none is available currently for CVE-2023-27350/ZDI-CAN-18987. Last month, PaperCut released patched versions 20.1.7, 21.2.11, and 22.0.9 which fix these vulnerabilities. While a definitive indicator of compromise doesn’t exist in detecting exploitation of these vulnerabilities on a target, PaperCut does offer some clues one can look for. ![]() Trend Micro will defer disclosing more details on these vulnerabilities until next month in order to give PaperCut customers time to patch. Coupled with the substantial list of affected product versions and exploitation of these vulnerabilities already observed happening in the wild, the impact could be quite broad. PaperCut’s website claims over 130 million users of their products across almost 90,000 organizations in almost 200 countries, including government, commercial, and educational users. The Application Server component of PaperCut MF and NG product versions 15.0 and later contain this flaw. The Application Server and Site Server components of PaperCut MF and NG product versions 8.0 and later contain this flaw.ĬVE-2023-27351/ ZDI-CAN-19226 has been assigned a CVSS score of 8.2 (“high”) and exists in the SecurityRequestFilter class as a flaw in the authentication algorithm, allowing for unauthenticated information disclosure. With a CVSS score of 9.8 (“critical”), CVE-2023-27350/ ZDI-CAN-18987 exists in the SetupCompleted class and can be leveraged for unauthenticated remote code execution due to improper access control. Reported via the Trend Micro Zero Day Initiative, these vulnerabilities can be exploited by unauthenticated attackers to achieve remote code execution as the SYSTEM user ( CVE-2023-27350/ ZDI-CAN-18987) or information disclosure, including user information and password hashes ( CVE-2023-27351/ ZDI-CAN-19226). PaperCut recently revealed that two products in its popular line of print server software contain severe vulnerabilities currently being exploited in the wild.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |