<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>PaperCut — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/papercut/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/papercut/feed.xml" rel="self" type="application/rss+xml"/><item><title>PaperCut NG/MF Improper Authentication Vulnerability (CVE-2023-27351)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-papercut-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-papercut-auth-bypass/</guid><description>CVE-2023-27351 is an improper authentication vulnerability in PaperCut NG/MF that allows remote attackers to bypass authentication via the SecurityRequestFilter class, leading to potential ransomware deployment.</description><content:encoded><![CDATA[<p>CVE-2023-27351 is a critical improper authentication vulnerability affecting PaperCut NG/MF. The vulnerability exists within the SecurityRequestFilter class, enabling remote attackers to bypass authentication mechanisms. This bypass can lead to unauthorized access to sensitive functionalities within the PaperCut NG/MF application. Publicly available reports indicate that this vulnerability is being actively exploited, including instances of ransomware deployment following successful exploitation. Due to the ease of exploitation and the potentially severe consequences, organizations using affected versions of PaperCut NG/MF are urged to apply mitigations immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PaperCut NG/MF instance accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the SecurityRequestFilter class.</li>
<li>The crafted request exploits the improper authentication vulnerability (CVE-2023-27351), bypassing normal authentication checks.</li>
<li>Upon successful authentication bypass, the attacker gains unauthorized access to the PaperCut NG/MF application with elevated privileges.</li>
<li>The attacker leverages the gained access to upload malicious scripts or binaries to the PaperCut server.</li>
<li>The attacker executes the uploaded payload, initiating the ransomware encryption process or other malicious activities.</li>
<li>Ransomware encrypts sensitive data on the PaperCut server and potentially spreads to other connected systems.</li>
<li>The attacker demands a ransom payment for the decryption key.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2023-27351 allows attackers to bypass authentication, gain unauthorized access, and potentially deploy ransomware. This can result in significant data loss, disruption of print services, and financial losses due to ransom demands and recovery efforts. The vulnerability is known to be actively exploited, increasing the risk to organizations using affected PaperCut NG/MF installations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations provided by PaperCut, referencing their knowledge base articles PO-1216 and PO-1219.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts against the SecurityRequestFilter class.</li>
<li>Follow applicable BOD 22-01 guidance for cloud services if the PaperCut instance is cloud-hosted.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>papercut</category><category>authentication-bypass</category><category>ransomware</category><category>cve-2023-27351</category></item></channel></rss>