First published: Thu Sep 26 2024(Updated: )
An arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server via the web-print-hot-folder. Important: In most installations, this risk is mitigated by the default Windows Server configuration, which restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log into the local console of the Windows environment hosting the PaperCut NG/MF application server. Note: This CVE has been split from CVE-2024-3037.
Credit: eb41dac7-0af8-4f84-9f6d-0272772514f4
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut MF | <23.0.9 | |
PaperCut NG | <23.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8404 has been rated as a critical severity vulnerability due to its potential for arbitrary file deletion.
To fix CVE-2024-8404, update PaperCut NG/MF to version 23.0.9 or later.
CVE-2024-8404 affects Windows servers running PaperCut NG and PaperCut MF with Web Print enabled.
An attacker exploiting CVE-2024-8404 can perform arbitrary file deletion on the affected server.
Yes, exploiting CVE-2024-8404 requires local login access to the Windows Server hosting PaperCut.