← Voltar para CVEs
CVE-2023-27350
CRITICALCISA KEV9.8
Descricao
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado4/20/2023
Ultima modificacao10/27/2025
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorPaperCut
ProdutoMF/NG
Nome da vulnerabilidadePaperCut MF/NG Improper Access Control Vulnerability
Data inclusao KEV2023-04-21
Prazo de remediacao2023-05-12
Uso em ransomwareKnown
Produtos afetados
papercut:papercut_mfpapercut:papercut_ng
Fraquezas (CWE)
CWE-284
Referencias
http://packetstormsecurity.com/files/171982/PaperCut-MF-NG-Authentication-Bypass-Remote-Code-Execution.html(zdi-disclosures@trendmicro.com)
http://packetstormsecurity.com/files/172022/PaperCut-NG-MG-22.0.4-Authentication-Bypass.html(zdi-disclosures@trendmicro.com)
http://packetstormsecurity.com/files/172512/PaperCut-NG-MG-22.0.4-Remote-Code-Execution.html(zdi-disclosures@trendmicro.com)
http://packetstormsecurity.com/files/172780/PaperCut-PaperCutNG-Authentication-Bypass.html(zdi-disclosures@trendmicro.com)
https://news.sophos.com/en-us/2023/04/27/increased-exploitation-of-papercut-drawing-blood-around-the-internet/(zdi-disclosures@trendmicro.com)
https://www.papercut.com/kb/Main/PO-1216-and-PO-1219(zdi-disclosures@trendmicro.com)
https://www.zerodayinitiative.com/advisories/ZDI-23-233/(zdi-disclosures@trendmicro.com)
http://packetstormsecurity.com/files/171982/PaperCut-MF-NG-Authentication-Bypass-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/172022/PaperCut-NG-MG-22.0.4-Authentication-Bypass.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/172512/PaperCut-NG-MG-22.0.4-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/172780/PaperCut-PaperCutNG-Authentication-Bypass.html(af854a3a-2127-422b-91ae-364da2661108)
https://news.sophos.com/en-us/2023/04/27/increased-exploitation-of-papercut-drawing-blood-around-the-internet/(af854a3a-2127-422b-91ae-364da2661108)
https://www.papercut.com/kb/Main/PO-1216-and-PO-1219(af854a3a-2127-422b-91ae-364da2661108)
https://www.zerodayinitiative.com/advisories/ZDI-23-233/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-27350(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.