No issues detected

Papirfly's response to the recent Critical CUPS Vulnerability →

Introduction

On Thursday 10 September 2024, details of a critical chained vulnerability were disclosed by a security researcher. Attackers can use these vulnerabilities to achieve remote code execution, potentially leading to complete control of vulnerable systems. This article summarises our investigation to determine if we are vulnerable and any actions taken to remediate this.

What has Papirfly done?

We checked our firewalls to confirm that incoming traffic from the Internet to port 631/tcp…


Legacy Papirfly Web Services   (?) Legacy Papirfly Brand Portals hosted on-prem Operational
Papirfly Cloud Services   (?) Papirfly Brand Management Platform hosted in AWS Operational
Incidents Downtime schedule Visit Papirfly
September 30, 2024 at 10:00 UTC

Papirfly's response to the recent Critical CUPS Vulnerability  ℹ

Introduction On Thursday 10 September 2024, details of a critical chained vulnerability were disclosed by a security researcher. Attackers can use these vulnerabilities to achieve remote code …
August 17, 2024 at 21:00 UTC

Scheduled maintenance on Papirfly Cloud environment  ℹ

Announcement From (21:00 UTC — Aug 17) to (21:59 UTC — Aug 17) a scheduled maintenance will be conducted on the AWS RDS cluster to reload CA certificates. During this maintenance period, there may be …
June 11, 2024 at 08:00 UTC

Problem affecting search function on Papirfly on-prem web sites

Resolved after 3h 0m
December 8, 2023 at 09:13 UTC

Service outage alert: Some Papirfly modules not working as expected

Resolved after 8h 8m of downtime
November 28, 2023 at 14:57 UTC

Ending support for CBC ciphers in TLS connections to Papirfly services  ℹ

Announcement On 2023-12-18 at 06:00 CET, Papirfly will end support of cipher suites using the Cipher Block Chaining (CBC) mode of operation on hosting environments. These cipher suites are known to be …

←   Previous     1 / 3     Next   →