First published: Thu Mar 14 2024(Updated: )
This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.
Credit: eb41dac7-0af8-4f84-9f6d-0272772514f4
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut MF | ||
All of | ||
Any of | ||
PaperCut NG/MF | <20.1.10 | |
PaperCut NG/MF | >=21.0.0<21.2.14 | |
PaperCut NG/MF | >=22.0.0<22.1.5 | |
PaperCut NG/MF | >=23.0.1<23.0.7 | |
PaperCut NG/MF | <20.1.10 | |
PaperCut NG/MF | >=21.0.0<21.2.14 | |
PaperCut NG/MF | >=22.0.0<22.1.5 | |
PaperCut NG/MF | >=23.0.1<23.0.7 | |
Any of | ||
Apple macOS | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.