Description
A race condition exists in PaperCut MF when processing badge-swipe data from certain HP multifunction devices. Under specific network conditions involving dropped packets and out-of-order sequence counters, the server may incorrectly process fragmented data chunks. If a sequence reset notification fails to reach the server, the server may reject the initial data chunk while erroneously accepting subsequent chunks before a connection reset completes.



This leads to the registration of a truncated badge ID string. While this typically results in an authentication failure, the vulnerability is compounded in environments utilizing custom badge-ID post-processing scripts. In such configurations, the truncated string may be transformed into a valid ID belonging to a different user, leading to unauthorized session establishment (Incorrect User Login) on the device.
Published: 2026-05-05
Score: 4.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A race condition in PaperCut MF arises while processing badge‑swipe data from certain HP multifunction devices. When network conditions cause dropped packets and out‑of‑order sequence counters, the server can incorrectly process fragmented chunks. If a sequence reset notification fails to arrive, the server may reject the first chunk but erroneously accept subsequent ones after the connection reset finishes. This produces a truncated badge ID string. In most cases the truncated ID merely causes authentication failure, but in environments that run custom badge‑ID post‑processing scripts the malformed identifier can be rewired into a valid ID belonging to another user, resulting in an unauthorized session establishment. The flaw stems from inadequate input validation and improper sequence‑number handling (CWE‑20 and CWE‑367).

Affected Systems

All deployments of PaperCut NG and PaperCut MF that use the affected integration with HP multifunction readers are potentially susceptible. No precise version range is provided, so any installation of these products should be considered at risk until a vendor patch is applied.

Risk and Exploitability

The CVSS score of 4.1 signals a low‑to‑medium severity, and the vulnerability is not listed in the CISA KEV catalog. The EPSS score is unavailable, but the exploit requires a specific sequence of packet loss and out‑of‑order delivery, making accidental exploitation unlikely. An attacker who can reliably manipulate traffic between the HP device and the PaperCut server could trigger the race condition; if custom badge‑ID post‑processing scripts are in place, the attacker could impersonate another user. Therefore, the risk escalates in setups that use such scripts and where an attacker can control network conditions.

Generated by OpenCVE AI on May 5, 2026 at 08:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest PaperCut NG/MF update as outlined in the vendor’s May 2026 security bulletin
  • Restrict network access between HP multifunction devices and the PaperCut server to reduce packet loss and out‑of‑order delivery
  • Disable or revise any custom badge‑ID post‑processing scripts that transform truncated identifiers into valid user IDs

Generated by OpenCVE AI on May 5, 2026 at 08:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 07:00:00 +0000

Type Values Removed Values Added
Description A race condition exists in PaperCut MF when processing badge-swipe data from certain HP multifunction devices. Under specific network conditions involving dropped packets and out-of-order sequence counters, the server may incorrectly process fragmented data chunks. If a sequence reset notification fails to reach the server, the server may reject the initial data chunk while erroneously accepting subsequent chunks before a connection reset completes. This leads to the registration of a truncated badge ID string. While this typically results in an authentication failure, the vulnerability is compounded in environments utilizing custom badge-ID post-processing scripts. In such configurations, the truncated string may be transformed into a valid ID belonging to a different user, leading to unauthorized session establishment (Incorrect User Login) on the device.
Title PaperCut MF: Card truncation on HP readers
Weaknesses CWE-20
CWE-367
References
Metrics cvssV4_0

{'score': 4.1, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: PaperCut

Published:

Updated: 2026-05-05T06:19:44.725Z

Reserved: 2026-04-13T05:21:02.099Z

Link: CVE-2026-6180

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T07:16:00.793

Modified: 2026-05-05T07:16:00.793

Link: CVE-2026-6180

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T08:30:20Z

Weaknesses