Cyber Posture

CVE-2026-5115

High

Published: 31 March 2026

Published
31 March 2026
Modified
03 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0002 5.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-5115 is a high-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Papercut Papercut Mf. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 5.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-13 (Cryptographic Protection) and SC-23 (Session Authenticity).

Threat & Defense at a Glance

What attackers do: exploitation maps to Network Sniffing (T1040) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates confidentiality and integrity protections for transmitted information, directly preventing leakage of sensitive data over the insecure communication channel between the embedded application and server.

prevent

Protects the authenticity of communication sessions, mitigating session hijacking enabled by intercepted sensitive data from the cleartext channel.

prevent

Requires cryptographic mechanisms to protect the confidentiality and integrity of communications, addressing the core cleartext transmission flaw (CWE-319).

MITRE ATT&CK Enterprise TechniquesAI

T1040 Network Sniffing Credential Access
Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network.
T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Insecure communication channel with cleartext sensitive data leakage (CWE-319) directly enables network sniffing of traffic (T1040) and adversary-in-the-middle positioning to intercept/hijack sessions or steal data (T1557).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The PaperCut NG/MF (specifically, the embedded application for Konica Minolta devices) is vulnerable to session hijacking. The PaperCut NG/MF Embedded application is a software interface that runs directly on the touch screen of a multi-function device. It was internally discovered…

more

that the communication channel between the embedded application and the server was insecure, which could leak data including sensitive information that may be used to mount an attack on the device. Such an attack could potentially be used to steal data or to perform a phishing attack on the end user.

Deeper analysisAI

CVE-2026-5115 is a session hijacking vulnerability in the PaperCut NG/MF Embedded application, specifically the version designed for Konica Minolta multi-function devices. This software interface runs directly on the device's touch screen and communicates with a PaperCut server. The flaw stems from an insecure communication channel that leaks data, including sensitive information that could enable further attacks on the device. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is associated with CWE-319 (Cleartext Transmission of Sensitive Information). It was internally discovered and published on 2026-03-31.

Remote attackers with network access can exploit this vulnerability without requiring authentication, privileges, or user interaction. By intercepting the insecure channel, they can obtain leaked sensitive data to mount attacks on the device itself, steal additional data, or conduct phishing against end users.

The PaperCut security bulletin provides details on mitigation: https://www.papercut.com/kb/Main/papercut-ng-mf-security-bulletin-march-2026/.

Details

CWE(s)

Affected Products

papercut
papercut mf
≤ 25.0.5
papercut
papercut mf konica minolta
≤ 25.0.9

CVEs Like This One

CVE-2025-34271Shared CWE-319
CVE-2025-64769Shared CWE-319
CVE-2026-24060Shared CWE-319
CVE-2026-31923Shared CWE-319
CVE-2026-32309Shared CWE-319
CVE-2025-70048Shared CWE-319
CVE-2025-0556Shared CWE-319
CVE-2026-30795Shared CWE-319
CVE-2024-44276Shared CWE-319
CVE-2026-22271Shared CWE-319

References