Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5115: CWE-319 Cleartext transmission of sensitive information in PaperCut Papercut NG/MF

0
Low
VulnerabilityCVE-2026-5115cvecve-2026-5115cwe-319
Published: Tue Mar 31 2026 (03/31/2026, 00:54:48 UTC)
Source: CVE Database V5
Vendor/Project: PaperCut
Product: Papercut NG/MF

Description

The PaperCut NG/MF (specifically, the embedded application for Konica Minolta devices) is vulnerable to session hijacking. The PaperCut NG/MF Embedded application is a software interface that runs directly on the touch screen of a multi-function device. It was internally discovered that the communication channel between the embedded application and the server was insecure, which could leak data including sensitive information that may be used to mount an  attack on the device. Such an attack could potentially be used to steal data or to perform a phishing attack on the end user.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 01:25:03 UTC

Technical Analysis

CVE-2026-5115 identifies a security vulnerability in the PaperCut NG/MF embedded application specifically designed for Konica Minolta multi-function devices. The core issue is the cleartext transmission of sensitive session information between the embedded application running on the device's touchscreen and the PaperCut server. This insecure communication channel exposes session tokens and other sensitive data to interception by attackers with network access, enabling session hijacking attacks. Such hijacking could allow unauthorized access to device functions or user data, and facilitate phishing attacks by impersonating legitimate device interfaces. The vulnerability is classified under CWE-319, which pertains to the transmission of sensitive information in cleartext. The CVSS 4.0 base score is 3.6 (low severity), reflecting that exploitation requires adjacent network access (AV:A), high attack complexity (AC:H), no privileges required (PR:N), but user interaction is needed (UI:P). The vulnerability does not impact confidentiality, integrity, or availability directly but compromises session confidentiality (VC:H). No known exploits have been reported in the wild, and no patches are currently linked, indicating this is a newly disclosed issue. The affected versions are unspecified but pertain to the embedded application on Konica Minolta devices using PaperCut NG/MF. The vulnerability highlights the need for secure communication protocols such as TLS to protect session data from interception.

Potential Impact

The primary impact of CVE-2026-5115 is the potential for session hijacking through interception of unencrypted session data transmitted between the PaperCut NG/MF embedded application and its server. This could lead to unauthorized access to multi-function device features, including printing, scanning, and user data management. Attackers could also leverage stolen session information to conduct phishing attacks targeting end users interacting with the device interface, potentially leading to credential theft or further compromise. While the vulnerability does not directly affect system availability or integrity, the confidentiality breach could expose sensitive organizational data. Organizations relying on PaperCut NG/MF with Konica Minolta devices in environments where network traffic is not adequately segmented or encrypted are at higher risk. The impact is mitigated by the requirement for adjacent network access and user interaction, limiting remote exploitation. However, in high-security environments or those with sensitive data, even low-severity vulnerabilities like this can have significant consequences if exploited.

Mitigation Recommendations

To mitigate CVE-2026-5115, organizations should: 1) Immediately verify and enforce the use of encrypted communication protocols (e.g., TLS 1.2 or higher) between the PaperCut NG/MF embedded application and its server to prevent cleartext data transmission. 2) Segment the network to restrict access to multi-function devices and their management interfaces, limiting exposure to adjacent network attackers. 3) Monitor network traffic for unencrypted session tokens or suspicious activity around multi-function devices. 4) Apply vendor patches or updates as soon as they become available to address this vulnerability directly. 5) Educate users about phishing risks associated with device interfaces and encourage vigilance when interacting with device touchscreens. 6) Review and harden device configurations to minimize unnecessary services and interfaces that could be exploited. 7) Implement strong authentication and session management controls on PaperCut NG/MF to reduce the impact of any session hijacking attempts. These steps go beyond generic advice by focusing on network architecture, user awareness, and proactive monitoring specific to the affected environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
PaperCut
Date Reserved
2026-03-29T22:32:07.583Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cb1e83e6bfc5ba1d972340

Added to database: 3/31/2026, 1:08:19 AM

Last enriched: 3/31/2026, 1:25:03 AM

Last updated: 3/31/2026, 3:16:11 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses