This leads to the registration of a truncated badge ID string. While this typically results in an authentication failure, the vulnerability is compounded in environments utilizing custom badge-ID post-processing scripts. In such configurations, the truncated string may be transformed into a valid ID belonging to a different user, leading to unauthorized session establishment (Incorrect User Login) on the device.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Papercut papercut Ng
|
|
| CPEs | cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:* cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Papercut papercut Ng
|
|
| Metrics |
cvssV3_1
|
Tue, 05 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Papercut
Papercut papercut Mf |
|
| Vendors & Products |
Papercut
Papercut papercut Mf |
Tue, 05 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A race condition exists in PaperCut MF when processing badge-swipe data from certain HP multifunction devices. Under specific network conditions involving dropped packets and out-of-order sequence counters, the server may incorrectly process fragmented data chunks. If a sequence reset notification fails to reach the server, the server may reject the initial data chunk while erroneously accepting subsequent chunks before a connection reset completes. This leads to the registration of a truncated badge ID string. While this typically results in an authentication failure, the vulnerability is compounded in environments utilizing custom badge-ID post-processing scripts. In such configurations, the truncated string may be transformed into a valid ID belonging to a different user, leading to unauthorized session establishment (Incorrect User Login) on the device. | |
| Title | PaperCut MF: Card truncation on HP readers | |
| Weaknesses | CWE-20 CWE-367 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: PaperCut
Published:
Updated: 2026-05-05T14:13:10.635Z
Reserved: 2026-04-13T05:21:02.099Z
Link: CVE-2026-6180
Updated: 2026-05-05T13:47:31.711Z
Status : Analyzed
Published: 2026-05-05T07:16:00.793
Modified: 2026-05-12T19:04:43.290
Link: CVE-2026-6180
No data.
OpenCVE Enrichment
Updated: 2026-05-05T21:30:05Z