DESCRIPTION LAST UPDATED: 2024-10-03
DEFAULT SEVERITY LEVEL: CRITICAL
This one-time Special Report contains information about CUPS instances accessible on port 631/UDP and vulnerable to CVE-2024-47176 as well as possibly vulnerable to RCE by chaining the vulnerability with CVE-2024-47076, CVE-2024-47175 and CVE-2024-47177.
For more details on these vulnerabilities please read Attacking-UNIX-systems-via-CUPS-Part-I.
Exposed CUPS services can also be potentially leveraged in DDoS amplification attacks – see When CUPS Runneth Over: The Threat of DDoS.
This scan was not conducted by Shadowserver.
Information contained in the report is obtained from an external source – thank you!
IPs in this report are tagged cups;cve-2024-47176
.
All events dated 2024-09-27 00:00:00 and shared on 2024-10-02.
Mitigation
Please take action if you receive an alert from us about a vulnerable host on your network:
- Do not expose port 631/UDP (and 631/TCP) to the Internet. Use ACLs (Access Control Lists) on the Internet edge to protect all devices who might unknowingly expose port 631 UDP/TCP.
- Deploy host filtering on the devices inside your network to manage who can access port 631.
- Update your installation to a patched version as soon as possible. Please consult your vendor (Linux distribution) for patches.
- If you do not use CUPS, consider removing it from your system entirely.
See the following advisories for more vulnerability details:
https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
Dashboard
You can view the Dashboard results by selecting source special
on 2024-10-02. For example you can view the World Map for vulnerable instances at https://dashboard.shadowserver.org/statistics/combined/map/?map_type=std&day=2024-10-02&source=special&geo=all&data_set=count&scale=log
About Special Reports
Shadowserver Special Reports are unlike all of our other standard free daily network reports.
Instead, we send out Special Reports in situations where we share one-time, high value datasets that we feel should be reported responsibly for maximum public benefit, such as in cases where we have a critical new vulnerability being exploited against potentially high value targets.
Note that the data shared across special reports may differ on a case by case basis hence the report formats for different Special Reports may be different.
Filename: 2024-10-02-special