FortiGuard Labs is aware that a recently disclosed vulnerability in PaperCut MF/NG (CVE-2023-27350) is susceptible to a remote code execution attack and is currently being exploited in the wild. Various remote management and maintenance software and Truebot malware were reportedly to have been deployed to unpatched severs. As such, patches should be applied as soon as possible. PaperCut NG is a print management software that helps organizations manage printing within their environment. It provides tools for monitoring printer usage, setting policies, and controlling access to resources. PaperCut NG is compatible with a wide range of printers, copiers, and multi-function devices and can be installed on various operating systems such as Windows, Linux, and macOS. The MF version shares the same codebase, but allows for support of multifunction devices.What is CVE-2023-27350?CVE-2023-27350 is a Remote Code Execution (RCE) vulnerability that allows an attacker to bypass authentication and remotely execute malicious code on unpatched servers.What is the CVSS Score?The vulnerability has a CVSS base score of 9.8.Is CVE-2023-27350 being Exploited in the Wild?PaperCut confirms the vulnerability is being exploited in the wild. Furthermore, known remote management, maintenance software and the Truebot malware were reported deployed on vulnerable servers. The Clop ransomware threat actor is believed to have used the Truebot malware in their attacks in this latest attack.Has the Vendor Released an Advisory for CVE-2023-27350?Yes, a vendor advisory is available. Please refer to the Appendix for a link to “URGENT | PaperCut MF/NG vulnerability bulletin (March 2023)”.Has the Vendor Released a Patch for CVE-2023-27350?Yes, PaperCut has released a patch for CVE-2023-27350 for PaperCut MF and PaperCut NG versions 20.1.7, 21.2.11 and 22.0.9 and later. Please refer to the “URGENT | PaperCut MF/NG vulnerability bulletin (March 2023) (PaperCut)” in the APPENDIX for further details.Which Versions of PaperCut are Vulnerable to CVE-2023-27350?According to the advisory, PaperCut MF or NG version 8.0 or later on all OS platforms are vulnerable.What is the Status of Protection?FortiGuard Labs has the following AV coverage in place for the known remote management and maintenance software deployed on servers after exploitation of CVE-2023-27350 as:W64/Agent.CGW!trRiskware/RemoteAdminAll reported network IOCs related to the post-exploitation activities are blocked by Webfiltering. FortiGuard Labs is currently investigating additional coverage and will update this Threat Signal when new information becomes available.Any Suggested Mitigation?The PaperCut advisory contains detailed mitigation and work arounds. Please refer to the “URGENT | PaperCut MF/NG vulnerability bulletin (March 2023) (PaperCut)” in the APPENDIX for further details.
More Stories
containernetworking-plugins-1.5.1-2.fc40
FEDORA-2025-f87fe38331 Packages in this update: containernetworking-plugins-1.5.1-2.fc40 Update description: Resolve FTBFS and rhbz#2351926 Read More
matrix-synapse-1.111.1-4.fc40
FEDORA-2025-cef83410f7 Packages in this update: matrix-synapse-1.111.1-4.fc40 Update description: Backport fixes from v1.127.1 Read More
matrix-synapse-1.118.0-4.fc41
FEDORA-2025-cddcfd6518 Packages in this update: matrix-synapse-1.118.0-4.fc41 Update description: Backport fixes from v1.127.1 Read More
matrix-synapse-1.127.1-1.fc42
FEDORA-2025-63751ef564 Packages in this update: matrix-synapse-1.127.1-1.fc42 Update description: Update to v1.127.1 (CVE-2025-30355) Read More
cri-tools1.29-1.29.0-11.fc41
FEDORA-2025-37c6639afe Packages in this update: cri-tools1.29-1.29.0-11.fc41 Update description: Resolve FTBFS Resolves: rhbz#2352149 Adopt trivy for license detection to be consistent...
cri-tools1.29-1.29.0-11.fc42
FEDORA-2025-adae8279e3 Packages in this update: cri-tools1.29-1.29.0-11.fc42 Update description: Resolve FTBFS Resolves: rhbz#2352149 Adopt trivy for license detection to be consistent...