Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New bug in SAP NetWeaver allows attackers to take over servers without logging in

Coinbase expands investment in India’s CoinDCX, with exchange value of $2.45 billion

Sam Altman says ChatGPT will soon allow erotica for adult users

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA adds papercut NG/MF CSRF vulnerability to KEV catalogue amid aggressive exploitation
Identity

CISA adds papercut NG/MF CSRF vulnerability to KEV catalogue amid aggressive exploitation

userBy userJuly 29, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 29, 2025Ravi LakshmananVulnerabilities/Software Security

The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a high-strength security vulnerability affecting PaperCutng/MF print management software to its known exploitation of exploitation in the wild, citing evidence of aggressive exploitation.

The vulnerability tracked as CVE-2023-2533 (CVSS score: 8.4) is a cross-site request forgery (CSRF) bug that could lead to remote code execution.

“PaperCut Ng/MF contains a cross-site request forgery (CSRF) vulnerability that could allow an attacker to change security settings or execute arbitrary code under certain conditions,” CISA said in a warning.

PaperCut NG/MF is commonly used by schools, businesses and government agencies to manage print jobs and control network printers. The management console is typically run on an internal web server, so the vulnerabilities exploited here can easily allow an attacker to step into a wider system if the oversight is overlooked.

Cybersecurity

In a potential attack scenario, threat actors can leverage the flaws to target administrator users in their current login sessions, deceive them, and click on specially created links that lead to unauthorized changes.

Currently, we don’t know how vulnerabilities are being exploited in real attacks. However, given that the drawback of software solutions is that they are being abused by Iranian nation-state actors and e-Crime groups such as BL00DY, CL0P and Lockbit ransomware, it is essential that the user applies the necessary updates, if not yet necessary, for initial access.

At the time of writing, public proof of concept is not available, but attackers can exploit the bug via phishing emails or malicious sites that trick a logged in administrator to trigger requests. Mitigation requires more than patching. Organisations should check session timeouts, limit administrative access to known IPs, and perform strong CSRF token validation.

A Federal Civil Enforcement Division (FCEB) agency is required to update the instance to a patch version by August 18, 2025 in accordance with Binding Operations Directive (BOD) 22-01.

Administrators need to cross-check Miter ATT & CK techniques such as the T1190 (publicly published applications) and T1071 (application layer protocol) to adjust detection rules. For a wider context, tracking paper cut incidents related to ransomware entry points or initial access vectors can help shape long-term hardening strategies.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWaymo taps Avis to manage the Robotaxi fleet in Dallas
Next Article Report: Proposed DC Rental Act will hurt black people and low-income residents
user
  • Website

Related Posts

New bug in SAP NetWeaver allows attackers to take over servers without logging in

October 15, 2025

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025

How Threat Hunting Builds Readiness

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New bug in SAP NetWeaver allows attackers to take over servers without logging in

Coinbase expands investment in India’s CoinDCX, with exchange value of $2.45 billion

Sam Altman says ChatGPT will soon allow erotica for adult users

At Starbase, SpaceX is doing its own firefighting.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.