HomePapercutCVE-2024-1221

CVE-2024-1221

LOW
3.1CVSS
Published: 2024-03-14
Updated: 2025-01-23
AI Analysis

Description

This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
network
Complexity
high
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-76NVD-CWE-Other

Metadata

Primary Vendor
PAPERCUT
Published
3/14/2024
Last Modified
1/23/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

papercut : papercut_mfpapercut : papercut_mfpapercut : papercut_mfpapercut : papercut_mfpapercut : papercut_ngpapercut : papercut_ngpapercut : papercut_ngpapercut : papercut_ng

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief