Security News > 2023 > April > Hackers actively exploit critical RCE bug in PaperCut servers
Print management software developer PaperCut is warning customers to update their software immediately, as hackers are actively exploiting flaws to gain access to vulnerable servers.
Today, the software developer updated its March 2023 security bulletin to warn customers that the vulnerabilities are now actively exploited by hackers.
"As of 18th April, 2023 we have evidence to suggest that unpatched servers are being exploited in the wild,," reads the advisory.
Users of impacted versions are recommended to upgrade to PaperCut MF and PaperCut NG versions 20.1.7, 21.2.11, and 22.0.9 and later.
PaperCut has no mitigation for the first flaw, while the second can be mitigated by applying "Allow list" restrictions under "Options > Advanced > Security > Allowed site server IP addresses" and setting this only to allow the IP addresses of verified Site Servers on your network.
Admins who suspect their servers were compromised are advised to take backups, wipe the Application Server, and rebuild everything from a safe backup point.
News URL
Related news
- Hackers exploit critical RCE flaw in Bricks WordPress site builder (source)
- New critical Microsoft Outlook RCE bug is trivial to exploit (source)
- Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining (source)
- Hackers exploit Ray framework flaw to breach servers, hijack resources (source)
- AnyDesk says hackers breached its production servers, resets passwords (source)
- AnyDesk says hackers breached its production servers, reset passwords (source)
- Week in review: Windows Event Log zero-day, exploited critical Jenkins RCE flaw (source)
- Hackers Exploit Job Boards, Stealing Millions of Resumes and Personal Data (source)
- Critical JetBrains TeamCity On-Premises Flaw Exposes Servers to Takeover - Patch Now (source)
- Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade (source)