CVE-2024-1223
low-risk
Published 2024-03-14
This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.
Do I need to act?
-
0.11% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.8/10
Medium
NETWORK
/ HIGH complexity
Affected Products (2)
Affected Vendors
References (2)
Vendor Advisory
https://www.papercut.com/kb/Main/Security-Bulletin-March-2024
Vendor Advisory
https://www.papercut.com/kb/Main/Security-Bulletin-March-2024
22
/ 100
low-risk
Severity
15/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
7/34 · Low