Vulnerability in PaperCut Print Deploy Could Expose Users to Man-in-the-Middle Attacks
CVE-2025-9785

7.7HIGH

Key Information:

Vendor

Papercut

Vendor
CVE Published:
3 September 2025

What is CVE-2025-9785?

PaperCut Print Deploy is an optional component designed to streamline printer deployment and management in conjunction with PaperCut NG/MF. However, if not properly configured, especially concerning SSL settings, it may leave communications between clients and servers susceptible to man-in-the-middle attacks. Inadequate documentation regarding SSL configuration has been identified, potentially leading users to misconfigure their Print Deploy client installations. It is critical for users to utilize valid SSL certificates and adhere to the latest documentation to secure their installations. For those employing private CA or self-signed certificates, it is essential to incorporate the associated Certification Authority certificate into the trust store of the operating system and the Java key store to mitigate security risks. Follow best practices to ensure the safety of your network communications.

Affected Version(s)

Print Deploy Windows 0 < 1.9.2917

References

CVSS V4

Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Tim Kornhuber of DBSystel GmbH ([email protected])
Oliver Matula of DBSystel GmbH ([email protected])
Maximilian Platzner of DBSystel GmbH ([email protected])
.
CVE-2025-9785 : Vulnerability in PaperCut Print Deploy Could Expose Users to Man-in-the-Middle Attacks