First published: Thu Mar 14 2024(Updated: )
This vulnerability potentially allows unauthorized write operations which may lead to remote code execution. An attacker must already have authenticated admin access and knowledge of both an internal system identifier and details of another valid user to exploit this.
Credit: eb41dac7-0af8-4f84-9f6d-0272772514f4
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
PaperCut NG | <20.1.10 | |
PaperCut NG | >=21.0.0<21.2.14 | |
PaperCut NG | >=22.0.0<22.1.5 | |
PaperCut NG | >=23.0.1<23.0.7 | |
PaperCut NG | <20.1.10 | |
PaperCut NG | >=21.0.0<21.2.14 | |
PaperCut NG | >=22.0.0<22.1.5 | |
PaperCut NG | >=23.0.1<23.0.7 | |
Any of | ||
Apple iOS and macOS | ||
Linux kernel | ||
Microsoft Windows | ||
PaperCut NG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-1654 is critical due to the potential for remote code execution that can arise from unauthorized write operations.
To fix CVE-2024-1654, update to the latest version of PaperCut NG/MF that addresses this vulnerability.
CVE-2024-1654 affects specific versions of PaperCut NG and PaperCut MF, particularly those prior to the fixed versions mentioned in security bulletins.
Exploiting CVE-2024-1654 requires authenticated admin access and knowledge of an internal system identifier along with details of a valid user.
CVE-2024-1654 could allow an attacker to perform unauthorized actions leading to the execution of malicious code on affected systems.