First published: Thu Apr 20 2023(Updated: )
PaperCut MF/NG contains an improper access control vulnerability within the SetupCompleted class that allows authentication bypass and code execution in the context of system.
Credit: zdi-disclosures@trendmicro.com zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut NG/MF | ||
PaperCut NG/MF | ||
PaperCut MF | >=8.0.0<20.1.7 | |
PaperCut MF | >=21.0.0<21.2.11 | |
PaperCut MF | >=22.0.0<22.0.9 | |
PaperCut NG | >=8.0.0<20.1.7 | |
PaperCut NG | >=21.0.0<21.2.11 | |
PaperCut NG | >=22.0.0<22.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27350 is an improper access control vulnerability found in PaperCut MF/NG.
The impact of CVE-2023-27350 is authentication bypass and code execution in the context of the system.
CVE-2023-27350 affects PaperCut MF/NG by allowing an attacker to bypass authentication and execute code on the system.
To fix CVE-2023-27350, apply the necessary security patches provided by PaperCut and ensure that you are running the latest version of PaperCut MF/NG.
More information about CVE-2023-27350 can be found in the official knowledge base article provided by PaperCut: https://www.papercut.com/kb/Main/PO-1216-and-PO-1219