Cyber Posture

CVE-2026-30277

High

Published: 31 March 2026

Published
31 March 2026
Modified
03 April 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 7.3th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30277 is a high-severity Path Traversal (CWE-22) vulnerability in Triumph-Adler Mobile Print. Its CVSS base score is 8.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 7.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents exploitation by requiring validation of file inputs during the import process to block malicious files enabling arbitrary overwrites of critical internal files.

prevent

Mitigates the specific flaw in TA/UTAX Mobile Print v3.7.2.251001 by identifying, prioritizing, and remediating the arbitrary file overwrite vulnerability.

preventdetect

Verifies the integrity of critical internal files to prevent execution of overwritten code or detect unauthorized modifications post-import.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Arbitrary file overwrite (path traversal) in a client PDF app directly enables local exploitation for code execution (T1203) and associated privilege escalation (T1068) by overwriting internal binaries/configs during import with no user interaction or privileges required.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

An arbitrary file overwrite vulnerability in PDF Reader App : TA/UTAX Mobile Print v3.7.2.251001 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.

Deeper analysisAI

CVE-2026-30277 is an arbitrary file overwrite vulnerability, classified under CWE-22, affecting the PDF Reader App within TA/UTAX Mobile Print version 3.7.2.251001. The flaw enables attackers to overwrite critical internal files during the file import process, which can result in arbitrary code execution or information exposure. Published on 2026-03-31, it carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact with relatively low barriers to exploitation.

A local attacker can exploit this vulnerability with low complexity and no required privileges or user interaction. By crafting a malicious file for import, the attacker overwrites essential internal files, achieving high levels of confidentiality, integrity, and availability disruption, such as executing arbitrary code on the affected system or exposing sensitive data.

Advisories and additional details are available in the following references: http://pdf.com, https://github.com/Secsys-FDU/AF_CVEs/issues/24, https://secsys.fudan.edu.cn/, and https://www.triumph-adler.com/ta-de-de/software/mobile-und-cloud/mobile-print.

Details

CWE(s)

Affected Products

triumph-adler
mobile print
3.7.2.251001

CVEs Like This One

CVE-2026-3179Shared CWE-22
CVE-2026-30279Shared CWE-22
CVE-2024-48885Shared CWE-22
CVE-2025-55282Shared CWE-22
CVE-2026-22871Shared CWE-22
CVE-2025-54307Shared CWE-22
CVE-2026-20688Shared CWE-22
CVE-2026-30283Shared CWE-22
CVE-2026-20615Shared CWE-22
CVE-2026-4092Shared CWE-22

References