August is off to a busy start for cyberthreats. In this article, we’ll recap Microsoft’s August Patch Tuesday announcement and the new PaperCut vulnerability. Read on to learn more.
Microsoft has released its August Patch Tuesday security updates, providing fixes for a total of 87 vulnerabilities, including two actively exploited zero-days and 23 remote code execution (RCE) vulnerabilities rated as “Critical” by Microsoft.
The two zero-day vulnerabilities being actively exploited can be found below:
The complete list of resolved vulnerabilities in the August 2023 Patch Tuesday updates can be found in the full report.
A serious vulnerability, identified as CVE-2023-39143, has been found in the popular PaperCut NG/MF print management software for those running on Windows systems before version 22.1.3.
This flaw may allow unauthorized individuals to access, delete or upload files to the PaperCut server, which could lead to remote control of the server under specific conditions. The external device integration setting, which is activated by default in certain versions of PaperCut, like the Commercial and MF versions, makes the server vulnerable to such attacks. Research suggests that most PaperCut installations use Windows and have this setting activated, exposing them to potential risks.
For Microsoft, Nuspire applies patches when they’re released in accordance with the vendor’s recommendations. Regarding the PaperCut vulnerability, Nuspire monitors client networks for indications of compromise based on behavioral indications along with known artifacts. Nuspire will continue to monitor and update as information becomes available.
Organizations should review the August 2023 security updates and apply patches as soon as possible to affected systems prioritized by criticality.
Organizations are strongly advised to take immediate actions to protect their PaperCut installations from potential security threats:
While exploiting this vulnerability is more complex than previous ones and involves multiple steps, PaperCut has been a target for threat actors in the past, so it is crucial to take the necessary precautions and secure your environment as soon as possible.