First published: Tue Jun 18 2024(Updated: )
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.6. The following CVEs are assigned: CVE-2024-1222.
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut NG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-22812 is rated at 8.6 on the CVSS scale, indicating a high risk.
To fix ZDI-CAN-22812, patch your PaperCut NG installation to the latest version provided by PaperCut.
Yes, ZDI-CAN-22812 allows remote attackers to bypass authentication without needing credentials.
There are currently no public exploits specifically targeting ZDI-CAN-22812, but it's critical to secure your system.
ZDI-CAN-22812 can lead to unauthorized access to the PaperCut NG system, potentially compromising sensitive information.