CISA Alert AA23-131A Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG.

Published: May 12, 2023, 8:34 p.m.

FBI and CISA are releasing this joint Cybersecurity Advisory in response to the active exploitation of CVE-2023-27350. This vulnerability occurs in certain versions of PaperCut NG and PaperCut MF, software applications that help organizations manage printing services, and enables an unauthenticated actor to execute malicious code remotely without credentials.\xa0\nAA23-131A Alert, Technical Details, and Mitigations\nPaperCut: URGENT | PaperCut MF/NG vulnerability bulletin (March 2023)\nHuntress: Critical Vulnerabilities in PaperCut Print Management Software\nNo-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.\nSee CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.\nU.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center\u2019s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov\xa0\nTo report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.\nLearn more about your ad choices. Visit megaphone.fm/adchoices