| CVE ID | CVE-2023-6006 |
| CVSS SCORE | 7.0, AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
| AFFECTED VENDORS |
PaperCut |
| AFFECTED PRODUCTS |
NG |
| VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of PaperCut NG. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the pc-pdl-to-image process. The process loads an executable from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. |
| ADDITIONAL DETAILS |
PaperCut has issued an update to correct this vulnerability. More details can be found at:
https://www.papercut.com/kb/Main/security-bulletin-november-2023/ |
| DISCLOSURE TIMELINE |
|
| CREDIT | Amol Dosanjh of Trend Micro and Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative |