First published: Thu Mar 14 2024(Updated: )
This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server.
Credit: eb41dac7-0af8-4f84-9f6d-0272772514f4
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut MF | ||
All of | ||
Any of | ||
PaperCut MF | <20.1.10 | |
PaperCut MF | >=21.0.0<21.2.14 | |
PaperCut MF | >=22.0.0<22.1.5 | |
PaperCut MF | >=23.0.1<23.0.7 | |
PaperCut NG | <20.1.10 | |
PaperCut NG | >=21.0.0<21.2.14 | |
PaperCut NG | >=22.0.0<22.1.5 | |
PaperCut NG | >=23.0.1<23.0.7 | |
Any of | ||
Apple macOS | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1882 has been rated with a high severity as it allows for remote code execution due to a vulnerability in the PaperCut NG/MF application.
To fix CVE-2024-1882, users should update their PaperCut NG/MF software to the latest version that addresses this vulnerability.
CVE-2024-1882 affects authenticated admin users of the PaperCut NG/MF application across multiple versions.
CVE-2024-1882 could be exploited to create a malicious payload enabling remote code execution on the server.
CVE-2024-1882 was disclosed in March 2024, highlighting a critical security risk for PaperCut NG/MF users.