This vulnerability potentially allows unauthorized write operations which may lead to remote code execution. An attacker must already have authenticated admin access and knowledge of both an internal system identifier and details of another valid user to exploit this.
References
Link | Resource |
---|---|
https://www.papercut.com/kb/Main/Security-Bulletin-March-2024 | Vendor Advisory |
https://www.papercut.com/kb/Main/Security-Bulletin-March-2024 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
23 Jan 2025, 20:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:* |
|
References | () https://www.papercut.com/kb/Main/Security-Bulletin-March-2024 - Vendor Advisory | |
CWE | NVD-CWE-Other | |
First Time |
Microsoft
Papercut Linux Apple macos Microsoft windows Papercut papercut Ng Linux linux Kernel Papercut papercut Mf Apple |
Information
Published : 2024-03-14 03:15
Updated : 2025-01-23 20:29
NVD link : CVE-2024-1654
Mitre link : CVE-2024-1654
CVE.ORG link : CVE-2024-1654
JSON object : View
Products Affected
apple
- macos
papercut
- papercut_ng
- papercut_mf
linux
- linux_kernel
microsoft
- windows
CWE