It was internally discovered that the communication channel between the embedded application and the server was insecure, which could leak data including sensitive information that may be used to mount an attack on the device. Such an attack could potentially be used to steal data or to perform a phishing attack on the end user.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Papercut papercut Mf Konica Minolta
|
|
| CPEs | cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:* cpe:2.3:a:papercut:papercut_mf_konica_minolta:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Papercut papercut Mf Konica Minolta
|
|
| Metrics |
cvssV3_1
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Papercut
Papercut papercut Mf |
|
| Vendors & Products |
Papercut
Papercut papercut Mf |
Tue, 31 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The PaperCut NG/MF (specifically, the embedded application for Konica Minolta devices) is vulnerable to session hijacking. The PaperCut NG/MF Embedded application is a software interface that runs directly on the touch screen of a multi-function device. It was internally discovered that the communication channel between the embedded application and the server was insecure, which could leak data including sensitive information that may be used to mount an attack on the device. Such an attack could potentially be used to steal data or to perform a phishing attack on the end user. | |
| Title | Session hijacking in PaperCut NG/MF embedded application for Konica Minolta devices | |
| Weaknesses | CWE-319 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: PaperCut
Published:
Updated: 2026-03-31T13:59:35.485Z
Reserved: 2026-03-29T22:32:07.583Z
Link: CVE-2026-5115
Updated: 2026-03-31T13:59:32.773Z
Status : Analyzed
Published: 2026-03-31T01:16:36.900
Modified: 2026-04-03T18:11:36.917
Link: CVE-2026-5115
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:10:38Z