

For more information on how to enroll in these services, email report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at or call (888) 282-0870, or report incidents to your local FBI field office. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure. 0 of PaperCut NG and MF, PaperCut introduced a new Application Server Failover feature, which supports using a Network Load Balancer to provide resiliency. The quote was for just under 7000.00 We would have to save a lot of paper to justify the cost. No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment. I got a quote to upgrade our PaperCut NG to MF, 3000 users. PaperCut MF and NG are print management solutions employed to manage and control printing and copying activities within users’ networked printing environments. Huntress: Critical Vulnerabilities in PaperCut Print Management Software There are reports of active exploitation of a critical vulnerability (CVE-2023-27350) in PaperCut MF (Multifunction) and NG (Next Generation). This vulnerability affects application servers only. PaperCut: URGENT | PaperCut MF/NG vulnerability bulletin (March 2023) Upgrade Papercut NG and MF application and site servers to version 20.1.7, 21.2.11, or 22.0.9 or later versions. This vulnerability occurs in certain versions of PaperCut NG and PaperCut MF, software applications that help organizations manage printing services, and enables an unauthenticated actor to execute malicious code remotely without credentials.ĪA23-131A Alert, Technical Details, and Mitigations FBI and CISA are releasing this joint Cybersecurity Advisory in response to the active exploitation of CVE-2023-27350.
