Serious Vulnerabilities in Linux CUPS Printing System Pose Risks of Remote Command Execution

Published:

spot_img

New Security Vulnerabilities Discovered in Linux CUPS Printing System

A new set of security vulnerabilities has been disclosed in the OpenPrinting Common Unix Printing System (CUPS) on Linux systems, allowing for remote command execution under certain conditions. Security researcher Simone Margaritelli highlighted a scenario where a remote unauthenticated attacker could replace existing printers’ IPP urls with malicious ones, leading to arbitrary command execution when a print job is initiated.

The vulnerabilities affect various components within the CUPS system, including cups-browsed, libcupsfilters, libppd, and cups-filters. These flaws could be chained together to create an exploit that enables an attacker to create a fake printing device on a network-exposed Linux system running CUPS and trigger remote code execution by sending a print job.

RHEL issued an advisory stating that all versions of the operating system are impacted by the vulnerabilities but clarified that they are not exploitable in the default configuration. Cybersecurity firm Rapid7 pointed out that affected systems can be exploited if UDP port 631 is accessible and the vulnerable service is listening.

Palo Alto Networks confirmed that its products and cloud services are not impacted by these CUPS-related vulnerabilities. Patches are currently being developed and are expected to be released soon. In the meantime, users are advised to disable or remove the cups-browsed service if unnecessary and to block or restrict traffic to UDP port 631.

While these vulnerabilities are serious, experts like Satnam Narang from Tenable emphasize that they do not reach the level of highly impactful vulnerabilities like Log4Shell or Heartbleed. Nevertheless, security research remains crucial in uncovering and addressing vulnerabilities to enhance overall cybersecurity.

spot_img

Related articles

Recent articles

Attackers Exploit Cloudflare Zero-Day to Bypass WAF Using ACME Certificate Validation

Understanding the Cloudflare Zero-Day Vulnerability In the rapidly evolving landscape of web security, vulnerabilities can pose significant risks to both service providers and their customers....

Language as Vulnerability: Unpacking the Google Gemini Calendar Exploit

Understanding the Google Gemini Vulnerability: A New Era of Cyber Threats Introduction to the Vulnerability In recent years, cybersecurity teams have devoted considerable efforts to strengthen...

Salalah Mills Opens $65 Million Bakery Plant in Khazaen Economic City

Bakery Manufacturing Plant Launches in Khazaen Economic City Introduction to the New Facility The Food Development Company, a key subsidiary of Salalah Mills Company, has recently...

Turning Insights Into Action

20 Jan From Insight to Action Join the pivotal event where security experts unite to lead the future. The Security Middle East Conference is emerging as...