CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
Published 2024-09-26 21:13:06
Updated 2024-10-02 20:15:12
Source GitHub, Inc.
View at NVD,   CVE.org

Products affected by CVE-2024-47176

Please log in to view affected product information.

Exploit prediction scoring system (EPSS) score for CVE-2024-47176

91.69%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2024-47176

  • CUPS IPP Attributes LAN Remote Code Execution
    Disclosure Date: 2024-09-26
    First seen: 2024-11-24
    exploit/multi/misc/cups_ipp_remote_code_execution
    This module exploits vulnerabilities in OpenPrinting CUPS, which is running by default on most Linux distributions. The vulnerabilities allow an attacker on the LAN to advertise a malicious printer that triggers remote code execution when a victim sends a pri

CVSS scores for CVE-2024-47176

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
8.4
HIGH CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
N/A
N/A
GitHub, Inc. 2024-09-26
8.3
HIGH CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1.6
6.0
GitHub, Inc. 2024-09-26
5.3
MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
3.9
1.4
GitHub, Inc. 2024-10-02
7.5
HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
N/A
N/A
RedHat-CVE-2024-47176 2024-09-27

CWE ids for CVE-2024-47176

  • The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
    Assigned by:
    • a0819718-46f1-4df5-94e2-005712e83aaa (Primary)
    • security-advisories@github.com (Secondary)
  • The product provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted.
    Assigned by:
    • a0819718-46f1-4df5-94e2-005712e83aaa (Primary)
    • security-advisories@github.com (Secondary)
  • The product assigns the address 0.0.0.0 for a database server, a cloud service/instance, or any computing resource that communicates remotely.
    Assigned by:
    • a0819718-46f1-4df5-94e2-005712e83aaa (Primary)
    • security-advisories@github.com (Primary)

References for CVE-2024-47176

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!