Security News > 2023 > April > Hackers actively exploit critical RCE bug in PaperCut servers
Print management software developer PaperCut is warning customers to update their software immediately, as hackers are actively exploiting flaws to gain access to vulnerable servers.
Today, the software developer updated its March 2023 security bulletin to warn customers that the vulnerabilities are now actively exploited by hackers.
"As of 18th April, 2023 we have evidence to suggest that unpatched servers are being exploited in the wild,," reads the advisory.
Users of impacted versions are recommended to upgrade to PaperCut MF and PaperCut NG versions 20.1.7, 21.2.11, and 22.0.9 and later.
PaperCut has no mitigation for the first flaw, while the second can be mitigated by applying "Allow list" restrictions under "Options > Advanced > Security > Allowed site server IP addresses" and setting this only to allow the IP addresses of verified Site Servers on your network.
Admins who suspect their servers were compromised are advised to take backups, wipe the Application Server, and rebuild everything from a safe backup point.
News URL
Related news
- Critical RCE bug in VMware vCenter Server now exploited in attacks (source)
- Hackers exploit critical bug in Array Networks SSL VPN products (source)
- Hackers exploit ProjectSend flaw to backdoor exposed servers (source)
- Exploit released for critical WhatsUp Gold RCE flaw, patch now (source)
- PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785) (source)
- Russia-Linked Turla Exploits Pakistani Hackers' Servers to Target Afghan and Indian Entities (source)
- Hackers target critical zero-day vulnerability in PTZ cameras (source)
- Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices (source)
- HPE warns of critical RCE flaws in Aruba Networking access points (source)
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)