Serious Vulnerabilities in Linux CUPS Printing System Pose Risks of Remote Command Execution

Published:

spot_img

New Security Vulnerabilities Discovered in Linux CUPS Printing System

A new set of security vulnerabilities has been disclosed in the OpenPrinting Common Unix Printing System (CUPS) on Linux systems, allowing for remote command execution under certain conditions. Security researcher Simone Margaritelli highlighted a scenario where a remote unauthenticated attacker could replace existing printers’ IPP urls with malicious ones, leading to arbitrary command execution when a print job is initiated.

The vulnerabilities affect various components within the CUPS system, including cups-browsed, libcupsfilters, libppd, and cups-filters. These flaws could be chained together to create an exploit that enables an attacker to create a fake printing device on a network-exposed Linux system running CUPS and trigger remote code execution by sending a print job.

RHEL issued an advisory stating that all versions of the operating system are impacted by the vulnerabilities but clarified that they are not exploitable in the default configuration. Cybersecurity firm Rapid7 pointed out that affected systems can be exploited if UDP port 631 is accessible and the vulnerable service is listening.

Palo Alto Networks confirmed that its products and cloud services are not impacted by these CUPS-related vulnerabilities. Patches are currently being developed and are expected to be released soon. In the meantime, users are advised to disable or remove the cups-browsed service if unnecessary and to block or restrict traffic to UDP port 631.

While these vulnerabilities are serious, experts like Satnam Narang from Tenable emphasize that they do not reach the level of highly impactful vulnerabilities like Log4Shell or Heartbleed. Nevertheless, security research remains crucial in uncovering and addressing vulnerabilities to enhance overall cybersecurity.

spot_img

Related articles

Recent articles

Fighting AI-Driven Cyberattacks with Preemptive Cyber Deception Strategies

Fighting AI-Driven Cyberattacks with Preemptive Cyber Deception Strategies Recent developments in artificial intelligence (AI) have underscored its role in facilitating advanced cyber espionage campaigns, as...

Afreximbank Launches Season II of ‘Impact Stories,’ Highlighting Transformative Projects Across Africa and the Caribbean

Afreximbank Launches Season II of ‘Impact Stories,’ Highlighting Transformative Projects Across Africa and the Caribbean The African Export-Import Bank (Afreximbank) has announced the launch of...

Cohesity Advances Cyber Resilience with Enhanced Data Protection and AI Security Solutions

Cohesity Advances Cyber Resilience with Enhanced Data Protection and AI Security Solutions Cohesity has unveiled significant enhancements to its data protection and security portfolio, aimed...

CISOs Must Strengthen Phishing Detection: 3 Essential Steps for Scaling SOC Effectiveness

CISOs Must Strengthen Phishing Detection: 3 Essential Steps for Scaling SOC Effectiveness Phishing has evolved into one of the most challenging threats for enterprises to...