First published: Tue Mar 14 2023(Updated: )
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is ZDI-CAN-18987.
The title of this vulnerability is ZDI-23-233: PaperCut NG SetupCompleted Improper Access Control Authentication Bypass Vulnerability.
This vulnerability has a severity level of 9.8 (critical).
The PaperCut NG software is affected by this vulnerability.
An attacker can exploit this vulnerability by bypassing authentication on affected installations of PaperCut NG.