Tech News
Printing vulnerability affecting Linux distros raises alarm
A series of four dangerous flaws in the Common Unix Printing System (Cups) has been recently discovered, causing concern among security professionals due to its widespread use across various operating systems such as GNU/Linux distros, Apple macOS, and Google Chrome/Chromium. These vulnerabilities were identified by researcher Simone Margaritelli, also known as evilsocket, who found that more than 76,000 devices, including 42,000 publicly accessible ones, may be at risk.
The vulnerabilities, tracked as CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, could potentially allow remote code execution on vulnerable systems. Attackers can exploit these flaws by adding a malicious Internet Printing Protocol (IPP) URL to a computer as a “ghost” printer and initiating a print job. Saeed Abbasi from the Qualys Threat Research Unit emphasized the critical nature of these vulnerabilities, stating that attackers could gain full control over affected systems without the need for valid credentials.
Given the broad attack surface of GNU/Linux systems in enterprise environments, cloud infrastructure, and critical applications, organizations are advised to assess their exposure risk, limit network access, deactivate non-essential services, and implement strict access controls. Quick patching and thorough testing of patches are recommended to prevent service interruptions.
Comparisons to Log4j?
With a high CVSS score indicating the ease of exploitation, the Cups vulnerabilities have drawn comparisons to the Log4Shell vulnerability in Apache Log4j2. Brian Fox of the Open Source Security Foundation highlighted the potential impact of successful exploitation on various systems running on Linux. Enterprise security teams are advised to proactively identify and patch vulnerable systems to mitigate the risk of attacks.
While fixed versions for the vulnerabilities are yet to be released, impacted users can take measures to mitigate the risk by disabling the Cups-browsed service, blocking traffic to UDP port 631, and DNS-SD traffic. Shachar Menashe from JFrog Security Research recommended these steps until official patches become available.
-
Destination3 months ago
Singapore Airlines CEO set to join board of Air India, BA News, BA
-
Tech News7 months ago
Bangladeshi police agents accused of selling citizens’ personal information on Telegram
-
Motivation6 months ago
The Top 20 Motivational Instagram Accounts to Follow (2024)
-
Guides & Tips5 months ago
Have Unlimited Korean Food at MANY Unlimited Topokki!
-
Guides & Tips5 months ago
Satisfy Your Meat and BBQ Cravings While in Texas
-
Gaming4 months ago
The Criterion Collection announces November 2024 releases, Seven Samurai 4K and more
-
Self Development7 months ago
Don’t Waste Your Time in Anger, Regrets, Worries and Grudges
-
Toys6 months ago
15 of the Best Trike & Tricycles Mums Recommend