Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Organizations Warned of Exploited PaperCut Flaw

Posted on July 29, 2025July 29, 2025 By CWS

The US cybersecurity company CISA on Monday warned {that a} two-year-old vulnerability in PaperCut’s NG and MF print administration merchandise has been exploited within the wild.

The flaw, tracked as CVE-2023-2533, is described as a high-severity cross-site request forgery (CSRF) challenge that, underneath sure circumstances, permits attackers to change safety settings or execute arbitrary code remotely.

“This could possibly be exploited if the goal is an admin with a present login session. Exploiting this may sometimes contain the opportunity of deceiving an admin into clicking a specifically crafted malicious hyperlink, probably resulting in unauthorized modifications,” PaperCut notes in a June 2023 advisory.

It ought to be famous that, whereas PaperCut assesses that CVE-2023-2533 has a CVSS rating of seven.9, NIST lists it with a CVSS rating of 8.8, whereas Fluid Assaults, which found the bug and launched proof-of-concept (PoC) code focusing on it, assesses that it has a CVSS rating of 8.4.

The safety defect impacts all PaperCut NG/MF variations previous to 22.1.1, on all platforms, and was addressed in variations 22.1.1, 21.2.12, and 20.1.8. Utility servers are affected as nicely, PaperCut’s advisory reads.

On Monday, CISA added the bug to its Identified Exploited Vulnerabilities (KEV) catalog, warning it has been exploited in assaults, however with out sharing particulars on the noticed exploitation.

Per Binding Operational Directive (BOD) 22-01, federal businesses have till August 18 to establish weak PaperCut deployments inside their environments and apply the obtainable patches.

Whereas BOD 22-01 solely applies to federal businesses, all organizations are suggested to assessment CISA’s KEV listing and prioritize the patching of safety defects related to their environments.Commercial. Scroll to proceed studying.

Knowledge from The Shadowserver Basis reveals there are roughly 1,000 PaperCut cases accessible from the web. Nonetheless, it’s unclear what number of of them are weak.

PaperCut’s NG/MF print administration options are utilized by greater than 100 million customers throughout over 70,000 organizations and risk actors beforehand exploited PaperCut flaws for which patches had been launched.

Associated: Mitel Patches Important Flaw in Enterprise Communication Platform

Associated: Chinese language Spies Goal Networking and Virtualization Flaws to Breach Remoted Environments

Associated: ToolShell Assaults Hit 400+ SharePoint Servers, US Authorities Victims Named

Associated: Hundreds of thousands of Automobiles Uncovered to Distant Hacking through PerfektBlue Assault

Security Week News Tags:Exploited, Flaw, Organizations, PaperCut, Warned

Post navigation

Previous Post: Fable Security Raises $31 Million for Human Risk Management Platform
Next Post: 10 Best Virtual Machine (VM) Monitoring Tools in 2025

Related Posts

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact Security Week News
CodeAnt AI Raises $2 Million for Code Quality and Application Security Platform  Security Week News
Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection Security Week News
40,000 Security Cameras Exposed to Remote Hacking Security Week News
Interpol Targets Infostealers: 20,000 IPs Taken Down, 32 Arrested, 216,000 Victims Notified Security Week News
Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News