← Zuruck zu CVEs
CVE-2023-27350
CRITICALCISA KEV9.8
Beschreibung
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht4/20/2023
Zuletzt geandert10/27/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerPaperCut
ProduktMF/NG
SchwachstellennamePaperCut MF/NG Improper Access Control Vulnerability
KEV Aufnahmedatum2023-04-21
Behebungsfrist2023-05-12
Ransomware-NutzungKnown
Betroffene Produkte
papercut:papercut_mfpapercut:papercut_ng
Schwachen (CWE)
CWE-284
Referenzen
http://packetstormsecurity.com/files/171982/PaperCut-MF-NG-Authentication-Bypass-Remote-Code-Execution.html(zdi-disclosures@trendmicro.com)
http://packetstormsecurity.com/files/172022/PaperCut-NG-MG-22.0.4-Authentication-Bypass.html(zdi-disclosures@trendmicro.com)
http://packetstormsecurity.com/files/172512/PaperCut-NG-MG-22.0.4-Remote-Code-Execution.html(zdi-disclosures@trendmicro.com)
http://packetstormsecurity.com/files/172780/PaperCut-PaperCutNG-Authentication-Bypass.html(zdi-disclosures@trendmicro.com)
https://news.sophos.com/en-us/2023/04/27/increased-exploitation-of-papercut-drawing-blood-around-the-internet/(zdi-disclosures@trendmicro.com)
https://www.papercut.com/kb/Main/PO-1216-and-PO-1219(zdi-disclosures@trendmicro.com)
https://www.zerodayinitiative.com/advisories/ZDI-23-233/(zdi-disclosures@trendmicro.com)
http://packetstormsecurity.com/files/171982/PaperCut-MF-NG-Authentication-Bypass-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/172022/PaperCut-NG-MG-22.0.4-Authentication-Bypass.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/172512/PaperCut-NG-MG-22.0.4-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/172780/PaperCut-PaperCutNG-Authentication-Bypass.html(af854a3a-2127-422b-91ae-364da2661108)
https://news.sophos.com/en-us/2023/04/27/increased-exploitation-of-papercut-drawing-blood-around-the-internet/(af854a3a-2127-422b-91ae-364da2661108)
https://www.papercut.com/kb/Main/PO-1216-and-PO-1219(af854a3a-2127-422b-91ae-364da2661108)
https://www.zerodayinitiative.com/advisories/ZDI-23-233/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-27350(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.