Cythera Cyber Security

Common Unix Printing System (CUPS) - Critical Vulnerability

A security researcher, Simone Margaritelli, has disclosed four vulnerabilities relating to the open-source printing system used in Linux & Unix operating systems.
Talk to an expert

Common Unix Printing System (CUPS) - Critical Vulnerability

What Is Vulnerable

The open-source printing system called “Common Unix Printing System (CUPS)”, seen in Linux & Unix operating systems is vulnerable. CUPS is used to manage, discover and share printers on the network.
Vulnerable operating system can be seen here

Affected versions: 

• cups-browsed & cups-filters <= 2.0.1 

• libcupsfilters & libppd <= 2.1b1 


What is Happening

A security researcher, Simone Margaritelli, has disclosed four vulnerabilities relating to the open-source printing system used in Linux & Unix operating systems.
The vulnerabilities found in CUPS can be exploited sequentially, providing the threat actor with remote code execution (RCE):

  • CVE-2024-47076 - CVSS 8.6
  • CVE-2024-47175 - CVSS: 8.6
  • CVE-2024-47176 - CVSS: 8.4
  • CVE-2024-47177 - CVSS: 9.1

Key Facts 

  • All four exploits must be executed sequentially to achieve RCE.
  • UDP port 631 must be open, with the “cups-browsed” service listening in on it.
  • User input is required. An end user must begin a printing job from a malicious printer (which was achieved during exploitation). 


What you can do 

  • Apply patches if they have been released for your operating system.
  • Block UDP port 631
  • Disable the “browsed-package” service. 

Assessing for possible impact

Cythera is actively monitoring for exploitation and post-exploitation activity for managed detection and response clients


If you have any questions or concerns about this or any other cybersecurity issue, please contact us



Events

Latest events

Join Cythera experts for networking events, technical briefings, and hands-on workshops hosted throughout the year.
View all events
No items found.
Cyber security news

Latest advisories

Stay ahead of emerging threats with our expert blog posts, research, and industry updates.
Silverstripe - Host Header Injection
Silverstripe CMS is affected by a Host Header Injection flaw, which can be exploited to manipulate password reset workflows, potentially redirecting or compromising user data.
FarCry Core Framework - Multiple Issues
FarCry Core contains multiple vulnerabilities that could let unauthenticated users upload arbitrary files and execute remote code on the hosting server.
Silverstripe – Cross-Site Scripting (XSS) Vulnerability
With local organisation admin credentials, an attacker can exploit the API to create, delete, or revert virtual machine snapshots in other organisations’ Virtual Data Centres (VDCs), breaching isolation boundaries.