CVE-2023-27350

Published Apr 20, 2023

Last updated 5 months ago

Overview

Description
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
Source
zdi-disclosures@trendmicro.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

CVSS 3.0

Type
Secondary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
PaperCut MF/NG Improper Access Control Vulnerability
Exploit added on
Apr 21, 2023
Exploit action due
May 12, 2023
Required action
Apply updates per vendor instructions.

Weaknesses

zdi-disclosures@trendmicro.com
CWE-284
nvd@nist.gov
NVD-CWE-Other

Social media

Hype score
Not currently trending

Configurations