Get Help Now
CONTACT US

Get expert threat analysis weekly. Sign up to receive our Threat Briefing:

    RESOURCES  >   THREAT INTEL BRIEFINGS

    Date: 08/09/2023

    New High Severity PaperCut Vulnerability

    Overview

    A new vulnerability has been discovered in PaperCut print management software. The vulnerability is tracked as CVE-2023-39143 (CVSS score: 8.4), affects PaperCut versions prior to version 22.1.3. The vulnerability is a combination of a path traversal and file upload vulnerability.

    Potential Impact

    The vulnerability can be exploited from an unauthenticated perspective to read, delete, and upload files to PaperCut. The file upload piece of the vulnerability is possible when the external device integration setting is enabled, which is on by default in some installations of PaperCut.

    Recommended Actions

    It is recommended to upgrade to version 22.1.3 or the latest available. Note that CVE-2023-39143 is more complex to exploit than the previous notable vulnerability CVE-2023-27350 that was widely exploited by threat actors looking to deploy ransomware. A mitigation step would be unchecking “Enable external hardware integration”.

    Request Consultation

    For a complimentary consultation, fill out the form below and we will be in touch soon.

      Number of Employees - select one:
      Industry - select one:

      Citrix NetScaler ADC and Gateway Servers Targeted

      Overview

      A vulnerability tracked as CVE-2023-3519 (CVSS score of 9.8) is a critical code injection vulnerability affecting NetScaler (formerly Citrix) Application Delivery Controller (ADC) and NetScaler Gateway that could lead to unauthenticated remote code execution. Initial reports of exploitation seem targeted but more widespread exploitation is expected.

      Potential Impact

      Threat actors exploiting this vulnerability are deploying web shells as an initial step. These web shells can be used as backdoor access to launch additional attacks against internal networks.

      Recommended Actions

      A full list affected applications and versions can be found here: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a. The recommendation is to install the relevant version of NetScaler ADC and NetScaler Gateway. A list of steps to take to detect exploitation can also be found in the aforementioned link. If a compromise is detected, quarantine or take the affected system offline.

      Sources

      https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a

      https://thehackernews.com/2023/08/hundreds-of-citrix-netscaler-adc-and.html

      British Researchers Publish Details on Highly Effective Acoustic Attack

      Overview

      On August 3, 2023, British researchers published research on an acoustic attack which can capture keystrokes with 95% accuracy.

      Potential Impact

      In coming years, expect this attack to become widely available to attackers. It may be used to collect sensitive information from victims by leveraging phone calls, online meetings, or other means.

      Recommended Actions

      Exercise care whenever entering sensitive information into a device. Implement Multi-Factor authentication for all accounts so that potentially leaked passwords do not provide attackers with immediate access to resources.

      Sources

      https://arxiv.org/pdf/2308.01074.pdf

      CISA Publishes Five-Eyes Nations “2022 Top Routinely Exploited Vulnerabilities” List

      Overview

      In cooperation with the Five-Eyes nations, CISA published a list of vulnerabilities found to be “routinely and frequently exploited by malicious cyber actors in 2022”. The advisory also recommends mitigations to these vulnerabilities.

      Potential Impact

      If your organization has vulnerabilities on this list exposed on the internet, expect exploitation to occur.

      Recommended Actions

      Read the advisory and assess your environment for any of the listed vulnerabilities. In addition to applying appropriate mitigations, assess vulnerable systems for compromise, and perform threat-hunting activities on internal networks.

      Sources

      https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a

      How can we help?

      If you need assistance with any of the Threats identified today or any other cybersecurity concerns, compliance issues or questions, please reach out through the contact button below.  We stand ready to assist!


      Let’s Discuss Your Cybersecurity Needs

      Contact Us  
      Privacy Settings
      We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
      Youtube
      Consent to display content from - Youtube
      Vimeo
      Consent to display content from - Vimeo
      Google Maps
      Consent to display content from - Google
      Spotify
      Consent to display content from - Spotify
      Sound Cloud
      Consent to display content from - Sound
      Contact Us