Description
This vulnerability potentially allows unauthorized write operations which may lead to remote code execution. An attacker must already have authenticated admin access and knowledge of both an internal system identifier and details of another valid user to exploit this.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- network
- Complexity
- low
- Privileges
- high
- User Action
- none
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- CWE-183NVD-CWE-Other
Metadata
- Primary Vendor
- PAPERCUT
- Published
- 3/14/2024
- Last Modified
- 1/23/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
papercut : papercut_mfpapercut : papercut_mfpapercut : papercut_mfpapercut : papercut_mfpapercut : papercut_ngpapercut : papercut_ngpapercut : papercut_ngpapercut : papercut_ng
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.