First published: Thu Mar 14 2024(Updated: )
This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.
Credit: eb41dac7-0af8-4f84-9f6d-0272772514f4
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut MF | ||
All of | ||
Any of | ||
PaperCut MF | <20.1.10 | |
PaperCut MF | >=21.0.0<21.2.14 | |
PaperCut MF | >=22.0.0<22.1.5 | |
PaperCut MF | >=23.0.1<23.0.7 | |
PaperCut NG | <20.1.10 | |
PaperCut NG | >=21.0.0<21.2.14 | |
PaperCut NG | >=22.0.0<22.1.5 | |
PaperCut NG | >=23.0.1<23.0.7 | |
Any of | ||
Apple macOS | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2024-1223 is classified as a medium severity issue allowing unauthorized information enumeration from embedded device APIs.
To fix CVE-2024-1223, update your PaperCut NG or MF software to the latest version as recommended by the vendor.
CVE-2024-1223 affects PaperCut NG/MF versions prior to 20.1.10 and between 21.0.0 to 23.0.7.
An attacker can exploit CVE-2024-1223 by leveraging existing knowledge of valid usernames, device names, and internal system keys.
Yes, CVE-2024-1223 poses a risk of unauthorized data exposure from the targeting of embedded device APIs.