CISA warns of active exploitation of critical PaperCut flaw, mandates immediate patching
Take action: If you use PaperCut NG/MF print management software, make sure it's not exposed to the internet. Then immediately apply the security patch released in June 2023, because attackers are actively exploiting flaws in PaperCut. Check your systems for any signs of compromise, because you may have already been hacked.
Learn More
CISA is warning that threat actors are actively exploiting high-severity vulnerabilities in PaperCut NG/MF print management software.
The exploited vulnerability is tracked as CVE-2023-2533 (CVSS score 8.4) - a cross-site request forgery (CSRF) bug that could result in remote code execution. The vendor has released a patch in June 2023.
PaperCut admin consoles typically run on internal web servers, so breaching one will provide attackers with a foothold into broader organizational systems. The software is widely deployed in educational institutions, corporate environments, and government facilities. According to Shadowserver monitoring data, over 1,100 PaperCut MF and NG servers are currently exposed online, although not all are necessarily vulnerable to CVE-2023-2533 attacks.
CISA has not disclosed specific details regarding the ongoing attacks or the threat actors involved.
Organizations using PaperCut NG/MF should immediately apply available security patches and review their systems for signs of compromise.