Lucene search

K
zdiAhmed Y. ElmogyZDI-24-779
HistoryJun 18, 2024 - 12:00 a.m.

PaperCut NG VendorKeys Hardcoded Credentials Authentication Bypass Vulnerability

2024-06-1800:00:00
Ahmed Y. Elmogy
www.zerodayinitiative.com
2
papercut ng
vendorkeys
hardcoded credentials
authentication bypass
vulnerability
remote attackers
configuration
external devices api

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.0%

This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of a VendorKeys object. The issue results from the use of hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication on the External Devices API.

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.0%

Related for ZDI-24-779