Threat Advisory

THREAT ADVISORY – DOOMSDAY CRITICAL LINUX BUG

September 27, 2024 | By Accorian

Description
A severe vulnerability, CVE-2024-47176, has been discovered in the Common UNIX Printing System (CUPS). It was made public on September 26, 2024, and affects Linux systems with cups-browsed enabled. This vulnerability requires the victim to start a print job, and if your cups-browsed is enabled, it could make him vulnerable to attacks that could lead to their computer being commandeered over the network or internet.

Impact

Attackers can exploit this vulnerability to hijack devices on networks, potentially gaining control over systems. While successful exploitation requires user interaction (the initiation of a print job), the risks remain significant, especially for systems that expose CUPS to public networks.

Affected Versions

CUPS is bundled with various Linux distributions, and the vulnerability affects:

  • Most Linux distributions with CUPS and cups-browsed enabled
  • Some BSD systems
  • Potentially Google ChromeOS, Oracle’s Solaris, and other distributions

Remediation

To mitigate the risk associated with this vulnerability, it is recommended to:

  • Disable or remove the cups-browsed service to prevent exposure.
  • Block access to UDP port 631 on firewalls to limit external access.
  • Update CUPS when security patches become available.
  • Consider removing CUPS entirely if it is not needed for printing tasks.

Source – https://www.theregister.com/2024/09/26/unauthenticated_rce_bug_linux/

If you would like our advice or assistance in the matter, feel free to contact us to schedule a scan and discuss your specific security requirements.

Kindly reach us at info@accorian.com or click through our Calendly link here to schedule an appointment at your convenient time Calendly Link.

Threat Advisory
Team Accorian

Recent Post

Ready to Start?

Ready to Start?​


Drop your CVs to joinourteam@accorian.com

Interested Position

Download Case study

Download SOC2 Guide