{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-1223","assignerOrgId":"eb41dac7-0af8-4f84-9f6d-0272772514f4","state":"PUBLISHED","assignerShortName":"PaperCut","dateReserved":"2024-02-05T04:34:01.599Z","datePublished":"2024-03-14T03:04:43.588Z","dateUpdated":"2024-09-26T03:50:15.610Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","platforms":["MacOS","Linux","Windows"],"product":"PaperCut NG, PaperCut MF","vendor":"PaperCut","versions":[{"changes":[{"at":"23.0.7","status":"unaffected"}],"lessThan":"23.0.7","status":"affected","version":"0","versionType":"custom"},{"changes":[{"at":"22.1.5","status":"unaffected"}],"lessThan":"22.1.5","status":"affected","version":"0","versionType":"custom"},{"changes":[{"at":"21.2.14","status":"unaffected"}],"lessThan":"21.2.14","status":"affected","version":"0","versionType":"custom"},{"changes":[{"at":"20.1.10","status":"unaffected"}],"lessThan":"20.1.10","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state."}],"value":"This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state."}],"impacts":[{"capecId":"CAPEC-131","descriptions":[{"lang":"en","value":"CAPEC-131 Resource Leak Exposure"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.8,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-488","description":"CWE-488: Exposure of Data Element to Wrong Session","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"eb41dac7-0af8-4f84-9f6d-0272772514f4","shortName":"PaperCut","dateUpdated":"2024-09-26T03:50:15.610Z"},"references":[{"url":"https://www.papercut.com/kb/Main/Security-Bulletin-March-2024"}],"source":{"discovery":"UNKNOWN"},"title":"Improper authorization controls in PaperCut NG/MF","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-1223","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-03-14T15:32:53.951317Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T18:01:22.597Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:33:25.230Z"},"title":"CVE Program Container","references":[{"url":"https://www.papercut.com/kb/Main/Security-Bulletin-March-2024","tags":["x_transferred"]}]}]}}