U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-8404

Change History

New CVE Received from PaperCut 9/25/2024 10:15:02 PM

Action Type Old Value New Value
Added Description

								
							
							
						
An arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server via the web-print-hot-folder. 

Important: In most installations, this risk is mitigated by the default Windows Server configuration, which restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log into the local console of the Windows environment hosting the PaperCut NG/MF application server.

Note: 

This CVE has been split from CVE-2024-3037.
Added CVSS V3.1

								
							
							
						
PaperCut AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
PaperCut CWE-59
Added Reference

								
							
							
						
PaperCut https://www.papercut.com/kb/Main/Security-Bulletin-May-2024/ [No types assigned]