CVE-2024-3037
PaperCut NG vulnerability analysis and mitigation

Overview

An arbitrary file deletion vulnerability (CVE-2024-3037) exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. The vulnerability was discovered and disclosed in May 2024. The affected systems include PaperCut NG and MF versions up to (excluding) 23.0.9 running on Windows servers (NVD).

Technical details

The specific flaw exists within the pc-web-print service. By creating a symbolic link, an attacker can abuse the service to delete a file. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The vulnerability is classified under CWE-552 (Files or Directories Accessible to External Parties) and CWE-59 (Improper Link Resolution Before File Access) (ZDI, NVD).

Impact

An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. The vulnerability could pose a significant risk to customers who allow non-administrative users to log in to the local console of the Windows environment hosting the PaperCut NG/MF application server (ZDI, NVD).

Mitigation and workarounds

PaperCut has issued an update to correct this vulnerability. The fix is available in version 23.0.9 and later of PaperCut NG/MF. Organizations are advised to upgrade to the latest version to protect against this vulnerability (ZDI).

Community reactions

The vulnerability was initially reported to the vendor on March 15, 2024, and a coordinated public release of the advisory was made on July 31, 2024. The vulnerability was later split into two separate CVEs (CVE-2024-3037 and CVE-2024-8404) with updated scoring to reflect the worst-case scenario (ZDI).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management