cve-2024-1223
Vulnerability from cvelistv5
Published
2024-03-14 03:04
Modified
2024-09-26 03:50
Summary
This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.
Impacted products
Vendor Product Version
PaperCut PaperCut NG, PaperCut MF Version: 0   < 23.0.7
Version: 0   < 22.1.5
Version: 0   < 21.2.14
Version: 0   < 20.1.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-1223",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-14T15:32:53.951317Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T18:01:22.597Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T18:33:25.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "platforms": [
            "MacOS",
            "Linux",
            "Windows"
          ],
          "product": "PaperCut NG, PaperCut MF",
          "vendor": "PaperCut",
          "versions": [
            {
              "changes": [
                {
                  "at": "23.0.7",
                  "status": "unaffected"
                }
              ],
              "lessThan": "23.0.7",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "22.1.5",
                  "status": "unaffected"
                }
              ],
              "lessThan": "22.1.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "21.2.14",
                  "status": "unaffected"
                }
              ],
              "lessThan": "21.2.14",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "20.1.10",
                  "status": "unaffected"
                }
              ],
              "lessThan": "20.1.10",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state."
            }
          ],
          "value": "This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-131",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-131 Resource Leak Exposure"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-488",
              "description": "CWE-488: Exposure of Data Element to Wrong Session",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-26T03:50:15.610Z",
        "orgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
        "shortName": "PaperCut"
      },
      "references": [
        {
          "url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Improper authorization controls in PaperCut NG/MF",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
    "assignerShortName": "PaperCut",
    "cveId": "CVE-2024-1223",
    "datePublished": "2024-03-14T03:04:43.588Z",
    "dateReserved": "2024-02-05T04:34:01.599Z",
    "dateUpdated": "2024-09-26T03:50:15.610Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-1223\",\"sourceIdentifier\":\"eb41dac7-0af8-4f84-9f6d-0272772514f4\",\"published\":\"2024-03-14T03:15:07.580\",\"lastModified\":\"2025-01-23T20:29:14.543\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.\"},{\"lang\":\"es\",\"value\":\"Esta vulnerabilidad permite potencialmente la enumeraci\u00f3n no autorizada de informaci\u00f3n de las API del dispositivo integrado. Un atacante ya debe tener conocimiento de alguna combinaci\u00f3n de nombres de usuario v\u00e1lidos, nombres de dispositivos y una clave interna del sistema. Para que un ataque de este tipo tenga \u00e9xito, el sistema debe estar en un estado de ejecuci\u00f3n espec\u00edfico.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"eb41dac7-0af8-4f84-9f6d-0272772514f4\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"eb41dac7-0af8-4f84-9f6d-0272772514f4\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-488\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"20.1.10\",\"matchCriteriaId\":\"87E57A99-6580-4C5D-AD49-2C77153698B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"21.0.0\",\"versionEndExcluding\":\"21.2.14\",\"matchCriteriaId\":\"AC862C5A-C51D-455A-BA4C-62AF4B5593D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"22.0.0\",\"versionEndExcluding\":\"22.1.5\",\"matchCriteriaId\":\"3B444455-3DE9-4268-AED3-9457016B833F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"23.0.1\",\"versionEndExcluding\":\"23.0.7\",\"matchCriteriaId\":\"06311316-1937-41A4-BEE2-57F7C4F6B6BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"20.1.10\",\"matchCriteriaId\":\"F7A1BAB4-D3AC-4A06-B2AB-E46DED8CB19D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"21.0.0\",\"versionEndExcluding\":\"21.2.14\",\"matchCriteriaId\":\"570DCFBC-7689-4E77-A8BF-8F310545EDE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"22.0.0\",\"versionEndExcluding\":\"22.1.5\",\"matchCriteriaId\":\"728ECAA8-FE3E-4F6D-8862-AF0C100C6699\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"23.0.1\",\"versionEndExcluding\":\"23.0.7\",\"matchCriteriaId\":\"7155AC1E-E4C8-4EF5-B593-7C924AF0C625\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"387021A0-AF36-463C-A605-32EA7DAC172E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://www.papercut.com/kb/Main/Security-Bulletin-March-2024\",\"source\":\"eb41dac7-0af8-4f84-9f6d-0272772514f4\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.papercut.com/kb/Main/Security-Bulletin-March-2024\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.papercut.com/kb/Main/Security-Bulletin-March-2024\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T18:33:25.230Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-1223\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-14T15:32:53.951317Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:17.725Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"Improper authorization controls in PaperCut NG/MF\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"capecId\": \"CAPEC-131\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-131 Resource Leak Exposure\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"PaperCut\", \"product\": \"PaperCut NG, PaperCut MF\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"23.0.7\", \"status\": \"unaffected\"}], \"version\": \"0\", \"lessThan\": \"23.0.7\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"22.1.5\", \"status\": \"unaffected\"}], \"version\": \"0\", \"lessThan\": \"22.1.5\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"21.2.14\", \"status\": \"unaffected\"}], \"version\": \"0\", \"lessThan\": \"21.2.14\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"20.1.10\", \"status\": \"unaffected\"}], \"version\": \"0\", \"lessThan\": \"20.1.10\", \"versionType\": \"custom\"}], \"platforms\": [\"MacOS\", \"Linux\", \"Windows\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://www.papercut.com/kb/Main/Security-Bulletin-March-2024\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-488\", \"description\": \"CWE-488: Exposure of Data Element to Wrong Session\"}]}], \"providerMetadata\": {\"orgId\": \"eb41dac7-0af8-4f84-9f6d-0272772514f4\", \"shortName\": \"PaperCut\", \"dateUpdated\": \"2024-09-26T03:50:15.610Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-1223\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-26T03:50:15.610Z\", \"dateReserved\": \"2024-02-05T04:34:01.599Z\", \"assignerOrgId\": \"eb41dac7-0af8-4f84-9f6d-0272772514f4\", \"datePublished\": \"2024-03-14T03:04:43.588Z\", \"assignerShortName\": \"PaperCut\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.