Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9785: CWE-295 Improper Certificate Validation in PaperCut Print Deploy

0
High
VulnerabilityCVE-2025-9785cvecve-2025-9785cwe-295
Published: Wed Sep 03 2025 (09/03/2025, 04:14:07 UTC)
Source: CVE Database V5
Vendor/Project: PaperCut
Product: Print Deploy

Description

PaperCut Print Deploy is an optional component that integrates with PaperCut NG/MF which simplifies printer deployment and management. When the component is deployed to an environment, the customer has an option to configure the system to use a self-signed certificate. If the customer does not fully configure the system to leverage the trust database on the clients, it opens up the communication between clients and the server to man-in-the-middle attacks.  It was discovered that certain parts of the documentation related to the configuration of SSL in Print Deploy were lacking, which could potentially contribute to a misconfiguration of the Print Deploy client installation. PaperCut strongly recommends to use valid certificates to secure installations and to follow the updated documentation to ensure the correct SSL configuration. Those who use private CAs and/or self-signed certificates should make sure to copy their Certification Authority certificate, or their self signed certificate if using only one, to the trust store of their operating system and to the Java key store

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:30:27 UTC

Technical Analysis

CVE-2025-9785 identifies a vulnerability in PaperCut Print Deploy, an optional component designed to simplify printer deployment and management within PaperCut NG/MF environments. The root cause is improper certificate validation (CWE-295) when self-signed certificates are used without fully configuring client trust stores. Specifically, if the system is configured to use self-signed certificates but the clients do not have the corresponding CA or self-signed certificates imported into their operating system trust stores and Java key stores, the SSL/TLS communication channel between clients and the Print Deploy server becomes susceptible to man-in-the-middle (MITM) attacks. This vulnerability is aggravated by incomplete or insufficient documentation guiding administrators on proper SSL configuration, increasing the likelihood of misconfiguration. The CVSS 4.0 base score is 7.7 (high severity), reflecting the vulnerability's potential to compromise confidentiality, integrity, and availability without requiring user interaction or authentication. While no public exploits have been reported, the vulnerability poses a significant risk in environments where self-signed certificates are used incorrectly. PaperCut strongly advises the use of valid certificates issued by trusted certificate authorities and following updated documentation to ensure correct SSL setup. For those using private CAs or self-signed certificates, it is critical to import the CA certificate or self-signed certificate into both the operating system trust store and the Java key store to prevent MITM attacks.

Potential Impact

The vulnerability allows attackers positioned on the network path between clients and the Print Deploy server to perform man-in-the-middle attacks, potentially intercepting, modifying, or injecting malicious data into print deployment communications. This can lead to unauthorized access to sensitive print job information, disruption of printer deployment processes, or manipulation of printer configurations. For organizations, this undermines the confidentiality and integrity of print management operations and could cause denial of service or operational disruptions. Given that Print Deploy is used in enterprise environments to streamline printer management, exploitation could impact large numbers of users and devices, leading to operational inefficiencies and potential data leakage. The lack of authentication and user interaction requirements lowers the barrier for exploitation in vulnerable configurations. Although no known exploits are currently in the wild, the risk remains significant, especially in environments relying on self-signed certificates without proper trust store configuration.

Mitigation Recommendations

1. Replace self-signed certificates with valid certificates issued by trusted Certificate Authorities (CAs) wherever possible to ensure robust SSL/TLS validation. 2. If self-signed or private CA certificates must be used, ensure that the corresponding CA or self-signed certificates are explicitly imported into the operating system trust store and the Java key store on all client machines to establish trust. 3. Follow the updated PaperCut Print Deploy SSL configuration documentation meticulously to avoid misconfiguration. 4. Conduct regular audits of SSL/TLS configurations in Print Deploy environments to verify that trust stores are correctly populated and that no insecure fallback mechanisms are in place. 5. Monitor network traffic for unusual patterns that could indicate MITM attempts, especially in environments using self-signed certificates. 6. Educate system administrators about the risks of improper certificate validation and the importance of maintaining updated and accurate SSL configurations. 7. Implement network segmentation and use VPNs or other secure channels to reduce exposure of Print Deploy communications to untrusted networks. 8. Stay updated with PaperCut advisories and apply patches or updates promptly when available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
PaperCut
Date Reserved
2025-09-01T06:47:33.435Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b7c4efad5a09ad00ec9825

Added to database: 9/3/2025, 4:32:47 AM

Last enriched: 2/27/2026, 4:30:27 AM

Last updated: 3/24/2026, 11:08:59 AM

Views: 214

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses