First published: Tue Jun 18 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PaperCut MF. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-1882.
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut NG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-785 is rated at 7.2 on the CVSS scale, indicating a high-level vulnerability.
To fix ZDI-24-785, update to the latest version of PaperCut MF that addresses this vulnerability.
ZDI-24-785 allows remote attackers to execute arbitrary code on affected installations of PaperCut MF.
Yes, authentication is required to exploit ZDI-24-785, but the existing authentication mechanism can be bypassed.
If ZDI-24-785 is exploited, attackers can execute arbitrary code, potentially compromising the affected system.