Search for vulnerabilities
Vulnerability details: VCID-5335-kq4z-zfgt
Vulnerability ID VCID-5335-kq4z-zfgt
Aliases CVE-2024-47176
Summary CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
Status Published
Exploitability 2.0
Weighted Severity 6.8
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.86364 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.86364 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.86647 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.86647 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.86647 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.86647 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.86647 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.8771 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.8771 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.8771 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.89663 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
epss 0.91689 https://api.first.org/data/v1/epss?cve=CVE-2024-47176
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json
https://api.first.org/data/v1/epss?cve=CVE-2024-47176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992
https://github.com/OpenPrinting/cups-browsed/commit/1debe6b140c37e0aa928559add4abcc95ce54aa2
https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
https://www.cups.org
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
http://www.openwall.com/lists/oss-security/2024/09/27/6
1082820 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082820
2314252 https://bugzilla.redhat.com/show_bug.cgi?id=2314252
CVE-2024-47176 https://nvd.nist.gov/vuln/detail/CVE-2024-47176
RHSA-2024:7346 https://access.redhat.com/errata/RHSA-2024:7346
RHSA-2024:7461 https://access.redhat.com/errata/RHSA-2024:7461
RHSA-2024:7462 https://access.redhat.com/errata/RHSA-2024:7462
RHSA-2024:7463 https://access.redhat.com/errata/RHSA-2024:7463
RHSA-2024:7503 https://access.redhat.com/errata/RHSA-2024:7503
RHSA-2024:7504 https://access.redhat.com/errata/RHSA-2024:7504
RHSA-2024:7506 https://access.redhat.com/errata/RHSA-2024:7506
RHSA-2024:7551 https://access.redhat.com/errata/RHSA-2024:7551
RHSA-2024:7553 https://access.redhat.com/errata/RHSA-2024:7553
RHSA-2024:7623 https://access.redhat.com/errata/RHSA-2024:7623
USN-7042-1 https://usn.ubuntu.com/7042-1/
USN-7042-2 https://usn.ubuntu.com/7042-2/
USN-7042-3 https://usn.ubuntu.com/7042-3/
USN-7043-1 https://usn.ubuntu.com/7043-1/
USN-7043-2 https://usn.ubuntu.com/7043-2/
USN-7043-3 https://usn.ubuntu.com/7043-3/
USN-7043-4 https://usn.ubuntu.com/7043-4/
Data source Metasploit
Description This module exploits vulnerabilities in OpenPrinting CUPS, which is running by default on most Linux distributions. The vulnerabilities allow an attacker on the LAN to advertise a malicious printer that triggers remote code execution when a victim sends a print job to the malicious printer. Successful exploitation requires user interaction, but no CUPS services need to be reachable via accessible ports. Code execution occurs in the context of the lp user. Affected versions are cups-browsed <= 2.0.1, libcupsfilters <= 2.1b1, libppd <= 2.1b1, and cups-filters <= 2.0.1.
Note
Stability:
  - crash-safe
Reliability:
  - event-dependent
SideEffects:
  - ioc-in-logs
  - artifacts-on-disk
Ransomware campaign use Unknown
Source publication date Sept. 26, 2024
Platform Linux,Unix
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/misc/cups_ipp_remote_code_execution.rb
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.28039
EPSS Score 0.00063
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-09-26T23:52:30.761961+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/7042-1/ 34.0.1