• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

PaperCut MF/NG Exploit - CVE-2023-27350

Risk Factors

This vulnerability is well known, affects most versions of PaperCut, and has been exploited in ransomware campaigns. Public exploit code and attack tools are available. A successful exploit enables an attacker to gain administrative access to the PaperCut server and launch additional attacks.

The system might change the risk score for this detection.

Kill Chain

Exploitation

Risk Score

87

Detection diagram
Next in Exploitation: ProxyLogon Exploit - [Multiple CVEs]

Attack Background

PaperCut provides multi-platform print management software. PaperCut NG manages printing. PaperCut MF manages printing in addition to scanning, copying, and faxing. After installing and configuring PaperCut MF/NG for the first time, users are taken to a SetupCompleted page. However, this page contains improper access controls that enable an attacker to exploit an authentication bypass vulnerability in PaperCut MF/NG. The attacker sends a malicious HTTP request with a query for the SetupCompleted page. The PaperCut server allows the attacker to log into a Dashboard from the SetupCompleted page and sends the attacker an HTTP response with a 200 status code. After bypassing authentication, the attacker can manipulate built-in PaperCut scripting functionality to run malicious JavaScript code on the print management server.

Mitigation Options

Upgrade to PaperCut MF/NG versions 20.1.7, 21.2.11, and 22.0.9 and later

MITRE ATT&CK ID

What else can RevealX do for you?