CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
References
Configurations
History
29 Sep 2025, 13:07
Type | Values Removed | Values Added |
---|---|---|
First Time |
Openprinting cups-browsed
Openprinting |
|
CPE | cpe:2.3:a:openprinting:cups-browsed:2.0.1:*:*:*:*:*:*:* | |
References | () https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992 - Product | |
References | () https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8 - Exploit, Vendor Advisory | |
References | () https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47 - Not Applicable | |
References | () https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5 - Not Applicable | |
References | () https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6 - Not Applicable | |
References | () https://www.cups.org - Product | |
References | () https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I - Exploit, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/27/6 - Mailing List | |
References | () https://github.com/OpenPrinting/cups-browsed/commit/1debe6b140c37e0aa928559add4abcc95ce54aa2 - Patch |
21 Nov 2024, 09:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Oct 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-20 |
02 Oct 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
Summary | (en) CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to. |
30 Sep 2024, 12:46
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Sep 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-26 22:15
Updated : 2025-09-29 13:07
NVD link : CVE-2024-47176
Mitre link : CVE-2024-47176
CVE.ORG link : CVE-2024-47176
JSON object : View
Products Affected
openprinting
- cups-browsed
CWE
CWE-1327
Binding to an Unrestricted IP Address