Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Robinhood startup fund stumbles in New York Stock Exchange debut

OSHA investigates fatal accident at Libyan warehouse

Microsoft, Google, Amazon and Anthropic Claude announce continued availability to non-defense customers

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA adds papercut NG/MF CSRF vulnerability to KEV catalogue amid aggressive exploitation
Identity

CISA adds papercut NG/MF CSRF vulnerability to KEV catalogue amid aggressive exploitation

userBy userJuly 29, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 29, 2025Ravi LakshmananVulnerabilities/Software Security

The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a high-strength security vulnerability affecting PaperCutng/MF print management software to its known exploitation of exploitation in the wild, citing evidence of aggressive exploitation.

The vulnerability tracked as CVE-2023-2533 (CVSS score: 8.4) is a cross-site request forgery (CSRF) bug that could lead to remote code execution.

“PaperCut Ng/MF contains a cross-site request forgery (CSRF) vulnerability that could allow an attacker to change security settings or execute arbitrary code under certain conditions,” CISA said in a warning.

PaperCut NG/MF is commonly used by schools, businesses and government agencies to manage print jobs and control network printers. The management console is typically run on an internal web server, so the vulnerabilities exploited here can easily allow an attacker to step into a wider system if the oversight is overlooked.

Cybersecurity

In a potential attack scenario, threat actors can leverage the flaws to target administrator users in their current login sessions, deceive them, and click on specially created links that lead to unauthorized changes.

Currently, we don’t know how vulnerabilities are being exploited in real attacks. However, given that the drawback of software solutions is that they are being abused by Iranian nation-state actors and e-Crime groups such as BL00DY, CL0P and Lockbit ransomware, it is essential that the user applies the necessary updates, if not yet necessary, for initial access.

At the time of writing, public proof of concept is not available, but attackers can exploit the bug via phishing emails or malicious sites that trick a logged in administrator to trigger requests. Mitigation requires more than patching. Organisations should check session timeouts, limit administrative access to known IPs, and perform strong CSRF token validation.

A Federal Civil Enforcement Division (FCEB) agency is required to update the instance to a patch version by August 18, 2025 in accordance with Binding Operations Directive (BOD) 22-01.

Administrators need to cross-check Miter ATT & CK techniques such as the T1190 (publicly published applications) and T1071 (application layer protocol) to adjust detection rules. For a wider context, tracking paper cut incidents related to ransomware entry points or initial access vectors can help shape long-term hardening strategies.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWaymo taps Avis to manage the Robotaxi fleet in Dallas
Next Article Report: Proposed DC Rental Act will hurt black people and low-income residents
user
  • Website

Related Posts

Transparent Tribe uses AI to mass produce malware implants in campaign targeting India

March 6, 2026

Multi-stage VOID#GEIST malware that delivers XWorm, AsyncRAT, and Xeno RAT

March 6, 2026

MSP guide to scaling cybersecurity with AI-powered risk management

March 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Robinhood startup fund stumbles in New York Stock Exchange debut

OSHA investigates fatal accident at Libyan warehouse

Microsoft, Google, Amazon and Anthropic Claude announce continued availability to non-defense customers

Bill Gates’ TeraPower receives approval to build new nuclear reactor

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.