No issues detected

Papirfly's response to the recent Critical CUPS Vulnerability →

Introduction

On Thursday 10 September 2024, details of a critical chained vulnerability were disclosed by a security researcher. Attackers can use these vulnerabilities to achieve remote code execution, potentially leading to complete control of vulnerable systems. This article summarises our investigation to determine if we are vulnerable and any actions taken to remediate this.

What has Papirfly done?

We checked our firewalls to confirm that incoming traffic from the Internet to port 631/tcp…


Legacy Papirfly Web Services   (?) Legacy Papirfly Brand Portals hosted on-prem Operational
Papirfly Cloud Services   (?) Papirfly Brand Management Platform hosted in AWS Operational
Incidents Downtime schedule Visit Papirfly
September 8, 2023 at 09:00 UTC

Degraded performance affecting some Papirfly web sites

Resolved after 8h 0m
August 24, 2023 at 07:00 UTC

Scheduled performance testing  ℹ

Announcement From (07:00 UTC — Aug 24) to (10:00 UTC — Aug 24) a performance test has been scheduled for a Papirfly service that may for a limited period affect performance for some customers. During …
November 14, 2022 at 05:30 UTC

Problem affecting some Papirfly web sites

Resolved after 4h 0m of downtime
November 1, 2022 at 15:00 UTC

Papirfly’s response to OpenSSL 3.x vulnerability  ℹ

Introduction Details of a critical vulnerability in OpenSSL will be published on 1st November 2022 between 1300 and 1700 UTC [1]. The vulnerability only affects version 3.x of OpenSSL. OpenSSL is a …
October 6, 2022 at 11:48 UTC

Network problem affecting several Papirfly web sites

Resolved after 32m

←   Previous     2 / 3     Next   →