Article
THREAT ADVISORY - DOOMSDAY CRITICAL LINUX BUG
Description A severe vulnerability, CVE-2024-47176, has been discovered in the Common UNIX Printing System (CUPS). It was made public on September 26, 2024, and affects Linux systems with cups-browsed enabled. This vulnerability requires the victim to start a print job, and if your cups-browsed is enabled, it could make him vulnerable to attacks that could lead to their computer being commandeered over the network or internet. Impact Attackers can exploit this vulnerability to hijack devices on networks, potentially gaining control over systems. While successful exploitation requires user interaction (the initiation of a print job), the risks remain significant, especially for systems that expose CUPS to public networks. Affected Versions CUPS is bundled with various Linux distributions, and the vulnerability affects: Most Linux distributions with CUPS and cups-browsed enabled Some BSD systems Potentially Google ChromeOS, Oracle's Solaris, and other distributions Remediation To mitigate the risk associated with this vulnerability, it is recommended to: Disable or remove the cups-browsed service to prevent exposure. Block access to UDP port 631 on firewalls to limit external access. Update CUPS when security patches become available. Consider removing CUPS entirely if it is not needed for printing tasks. Source - https://www.theregister.com/2024/09/26/unauthenticated_rce_bug_linux/ If you would like our advice or assistance in the matter, feel free to contact us to schedule a scan and discuss your specific security requirements. Kindly reach us at info@accorian.com or click through our Calendly link here to schedule an appointment at your convenient time Calendly Link. Threat Advisory Team Accorian
View More