Skip to content

Common UNIX Printing System (CUPS) Critical Vulnerabilities - 20240930001

Overview

The WA SOC has been made aware of several critical vulnerabilities involving the Common UNIX Printing System (CUPS). These vulnerabilities could allow a remote, unauthenticated attacker to execute commands when a print job starts on the targeted device by replacing IPP URLs with a malicious one, resulting in data theft or damage to critical production systems.

What is vulnerable?

Affected Component Description CVE CVSSv3 Severity
libcupsfilters libscupsfilters Improper Input Validation or Sanitization Vulnerability CVE-2024-47076 8.6 High
libppd libppd Improper Input Validation or Sanitization Vulnerability CVE-2024-47175 8.6 High
cups-browsed cups-browsed Binding to an Unrestricted IP Address Vulnerability CVE-2024-47176 8.4 High
cups-filters cups-filters Command Injection Vulnerability CVE-2024-47177 9.1 Critical

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours... (refer Patch Management):

Additional References