Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

An old PaperCut bug is now being actively exploited by hackers

CISA has not released specific details concerning current attacks but has incorporated CVE-2023-2533 into its Known Exploited Vulnerabilities Catalog.

byEmre Çıtak
July 29, 2025
in Cybersecurity, News
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding active exploitation of a high-severity vulnerability, CVE-2023-2533, within PaperCut NG/MF print management software, urging immediate patching for over 100 million users across 70,000 organizations.

CVE-2023-2533, a cross-site request forgery (CSRF) vulnerability patched in June 2023, enables remote code execution. Exploitation requires an attacker to trick an administrator, possessing a current login session, into clicking a maliciously crafted link, which can lead to altered security settings or arbitrary code execution. CISA has not released specific details concerning current attacks but has incorporated CVE-2023-2533 into its Known Exploited Vulnerabilities Catalog.

Federal Civilian Executive Branch (FCEB) agencies are mandated by the November 2021 Binding Operational Directive (BOD) 22-01 to patch this vulnerability by August 18. CISA advises all organizations, including those in the private sector, to prioritize patching, stating that such vulnerabilities are frequent attack vectors for malicious cyber actors and present significant risks to the federal enterprise.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.


Microsoft finds a major privacy flaw in Apple’s Spotlight search


Shadowserver, a non-profit security organization, currently identifies over 1,100 PaperCut MF and NG servers exposed online. Not all these servers are susceptible to CVE-2023-2533 attacks. While CISA has no evidence directly linking CVE-2023-2533 to ransomware attacks, PaperCut servers have been compromised by ransomware groups earlier in 2023. These prior breaches leveraged CVE-2023-27350, a critical unauthenticated remote code execution vulnerability, and CVE-2023-27351, a high-severity information disclosure flaw.

In April 2023, Microsoft associated attacks on PaperCut servers with the LockBit and Clop ransomware gangs, who utilized their access to steal corporate data. Approximately two weeks thereafter, Microsoft reported that Iranian state-backed hacking groups, identified as Muddywater and APT35, had also engaged in these attacks. These threat actors exploited the ‘Print Archiving‘ feature, which is designed to save documents routed through PaperCut printing servers.

CISA included CVE-2023-27350 in its catalog of actively exploited vulnerabilities on April 21, 2023, requiring U.S. federal agencies to secure their servers by May 12, 2023. One month later, CISA and the FBI jointly issued an advisory, indicating that the Bl00dy Ransomware gang had also commenced exploiting the CVE-2023-27350 RCE vulnerability to gain initial access to educational organizations’ networks.


Featured image credit

Tags: papercut

Related Posts

Leaked: Xiaomi 17 Ultra has 200MP periscope camera

Leaked: Xiaomi 17 Ultra has 200MP periscope camera

December 5, 2025
Leak reveals Samsung EP-P2900 25W magnetic charging dock

Leak reveals Samsung EP-P2900 25W magnetic charging dock

December 5, 2025
Kobo quietly updates Libra Colour with larger 2,300 mAh battery

Kobo quietly updates Libra Colour with larger 2,300 mAh battery

December 5, 2025
Google Discover tests AI headlines that rewrite news with errors

Google Discover tests AI headlines that rewrite news with errors

December 5, 2025
TikTok rolls out location-based Nearby Feed

TikTok rolls out location-based Nearby Feed

December 5, 2025
Meta claims AI reduced hacks by 30% as it revamps support tools

Meta claims AI reduced hacks by 30% as it revamps support tools

December 5, 2025

LATEST NEWS

Leaked: Xiaomi 17 Ultra has 200MP periscope camera

Leak reveals Samsung EP-P2900 25W magnetic charging dock

Kobo quietly updates Libra Colour with larger 2,300 mAh battery

Google Discover tests AI headlines that rewrite news with errors

TikTok rolls out location-based Nearby Feed

Meta claims AI reduced hacks by 30% as it revamps support tools

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.