Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Pypi warns of ongoing phishing campaigns using fake verification emails and Lookalike Domain

Experts reveal industry insights with Quantum.tech Europe

The founder left Silicon Valley to challenge the hegemony of US defense from Athens, investors are paying attention

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA adds papercut NG/MF CSRF vulnerability to KEV catalogue amid aggressive exploitation
Identity

CISA adds papercut NG/MF CSRF vulnerability to KEV catalogue amid aggressive exploitation

userBy userJuly 29, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 29, 2025Ravi LakshmananVulnerabilities/Software Security

The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a high-strength security vulnerability affecting PaperCutng/MF print management software to its known exploitation of exploitation in the wild, citing evidence of aggressive exploitation.

The vulnerability tracked as CVE-2023-2533 (CVSS score: 8.4) is a cross-site request forgery (CSRF) bug that could lead to remote code execution.

“PaperCut Ng/MF contains a cross-site request forgery (CSRF) vulnerability that could allow an attacker to change security settings or execute arbitrary code under certain conditions,” CISA said in a warning.

PaperCut NG/MF is commonly used by schools, businesses and government agencies to manage print jobs and control network printers. The management console is typically run on an internal web server, so the vulnerabilities exploited here can easily allow an attacker to step into a wider system if the oversight is overlooked.

Cybersecurity

In a potential attack scenario, threat actors can leverage the flaws to target administrator users in their current login sessions, deceive them, and click on specially created links that lead to unauthorized changes.

Currently, we don’t know how vulnerabilities are being exploited in real attacks. However, given that the drawback of software solutions is that they are being abused by Iranian nation-state actors and e-Crime groups such as BL00DY, CL0P and Lockbit ransomware, it is essential that the user applies the necessary updates, if not yet necessary, for initial access.

At the time of writing, public proof of concept is not available, but attackers can exploit the bug via phishing emails or malicious sites that trick a logged in administrator to trigger requests. Mitigation requires more than patching. Organisations should check session timeouts, limit administrative access to known IPs, and perform strong CSRF token validation.

A Federal Civil Enforcement Division (FCEB) agency is required to update the instance to a patch version by August 18, 2025 in accordance with Binding Operations Directive (BOD) 22-01.

Administrators need to cross-check Miter ATT & CK techniques such as the T1190 (publicly published applications) and T1071 (application layer protocol) to adjust detection rules. For a wider context, tracking paper cut incidents related to ransomware entry points or initial access vectors can help shape long-term hardening strategies.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWaymo taps Avis to manage the Robotaxi fleet in Dallas
Next Article Report: Proposed DC Rental Act will hurt black people and low-income residents
user
  • Website

Related Posts

Pypi warns of ongoing phishing campaigns using fake verification emails and Lookalike Domain

July 29, 2025

How browsers became the battlefield for the main cyber

July 29, 2025

Cybercriminal uses fake apps to steal data and threaten users across Asian mobile networks

July 29, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Pypi warns of ongoing phishing campaigns using fake verification emails and Lookalike Domain

Experts reveal industry insights with Quantum.tech Europe

The founder left Silicon Valley to challenge the hegemony of US defense from Athens, investors are paying attention

Sex toy maker Lovense leaked the user’s email address and published its account for acquisition

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.