{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T14:17:34.966","vulnerabilities":[{"cve":{"id":"CVE-2024-1223","sourceIdentifier":"eb41dac7-0af8-4f84-9f6d-0272772514f4","published":"2024-03-14T03:15:07.580","lastModified":"2025-01-23T20:29:14.543","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state."},{"lang":"es","value":"Esta vulnerabilidad permite potencialmente la enumeración no autorizada de información de las API del dispositivo integrado. Un atacante ya debe tener conocimiento de alguna combinación de nombres de usuario válidos, nombres de dispositivos y una clave interna del sistema. Para que un ataque de este tipo tenga éxito, el sistema debe estar en un estado de ejecución específico."}],"metrics":{"cvssMetricV31":[{"source":"eb41dac7-0af8-4f84-9f6d-0272772514f4","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":2.5}]},"weaknesses":[{"source":"eb41dac7-0af8-4f84-9f6d-0272772514f4","type":"Secondary","description":[{"lang":"en","value":"CWE-488"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*","versionEndExcluding":"20.1.10","matchCriteriaId":"87E57A99-6580-4C5D-AD49-2C77153698B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*","versionStartIncluding":"21.0.0","versionEndExcluding":"21.2.14","matchCriteriaId":"AC862C5A-C51D-455A-BA4C-62AF4B5593D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*","versionStartIncluding":"22.0.0","versionEndExcluding":"22.1.5","matchCriteriaId":"3B444455-3DE9-4268-AED3-9457016B833F"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*","versionStartIncluding":"23.0.1","versionEndExcluding":"23.0.7","matchCriteriaId":"06311316-1937-41A4-BEE2-57F7C4F6B6BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*","versionEndExcluding":"20.1.10","matchCriteriaId":"F7A1BAB4-D3AC-4A06-B2AB-E46DED8CB19D"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*","versionStartIncluding":"21.0.0","versionEndExcluding":"21.2.14","matchCriteriaId":"570DCFBC-7689-4E77-A8BF-8F310545EDE3"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*","versionStartIncluding":"22.0.0","versionEndExcluding":"22.1.5","matchCriteriaId":"728ECAA8-FE3E-4F6D-8862-AF0C100C6699"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*","versionStartIncluding":"23.0.1","versionEndExcluding":"23.0.7","matchCriteriaId":"7155AC1E-E4C8-4EF5-B593-7C924AF0C625"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","matchCriteriaId":"387021A0-AF36-463C-A605-32EA7DAC172E"},{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","matchCriteriaId":"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://www.papercut.com/kb/Main/Security-Bulletin-March-2024","source":"eb41dac7-0af8-4f84-9f6d-0272772514f4","tags":["Vendor Advisory"]},{"url":"https://www.papercut.com/kb/Main/Security-Bulletin-March-2024","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}