The Department of Education recently released Electronic Announcement GENERAL-23-35
, referencing the joint FBI/CISA advisory on active exploits of vulnerable PaperCut
NG and MF software versions. The vulnerability allows an attacker to gain access to the underlying computer(s) without a login. Since many organizations allow access to their PaperCut solution from the internet and the FBI/CISA advisory indicates active exploits are in progress, it is critical to check the PaperCut version and update it if needed. The following PaperCut versions are vulnerable:
- Version 8.0.0 to 19.2.7
- Version 20.0.0 to 20.1.6
- Version 21.0.0 to 21.2.10
- Version 22.0.0 to 22.0.8
PaperCut issued a patch update in March 2023 that needs to be applied immediately if any of these versions are in use.
The FBI/CISA advisory includes detailed technical information about the indicators of potential compromise, network traffic signatures, and common emails used by the main group of cyber criminals involved in active exploits.
If you are concerned your instance of PaperCut is at risk or your IT team needs assistance interpreting the technical details of the advisories, feel free to contact our RubinBrown Cyber Security Team at any time.
Readers should not act upon information presented without individual professional consultation.
Any federal tax advice contained in this communication (including any attachments): (i) is intended for your use only; (ii) is based on the accuracy and completeness of the facts you have provided us; and (iii) may not be relied upon to avoid penalties.