Tech News
Printing vulnerability affecting Linux distros raises alarm
A series of four dangerous flaws in the Common Unix Printing System (Cups) has been recently discovered, causing concern among security professionals due to its widespread use across various operating systems such as GNU/Linux distros, Apple macOS, and Google Chrome/Chromium. These vulnerabilities were identified by researcher Simone Margaritelli, also known as evilsocket, who found that more than 76,000 devices, including 42,000 publicly accessible ones, may be at risk.
The vulnerabilities, tracked as CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, could potentially allow remote code execution on vulnerable systems. Attackers can exploit these flaws by adding a malicious Internet Printing Protocol (IPP) URL to a computer as a “ghost” printer and initiating a print job. Saeed Abbasi from the Qualys Threat Research Unit emphasized the critical nature of these vulnerabilities, stating that attackers could gain full control over affected systems without the need for valid credentials.
Given the broad attack surface of GNU/Linux systems in enterprise environments, cloud infrastructure, and critical applications, organizations are advised to assess their exposure risk, limit network access, deactivate non-essential services, and implement strict access controls. Quick patching and thorough testing of patches are recommended to prevent service interruptions.
Comparisons to Log4j?
With a high CVSS score indicating the ease of exploitation, the Cups vulnerabilities have drawn comparisons to the Log4Shell vulnerability in Apache Log4j2. Brian Fox of the Open Source Security Foundation highlighted the potential impact of successful exploitation on various systems running on Linux. Enterprise security teams are advised to proactively identify and patch vulnerable systems to mitigate the risk of attacks.
While fixed versions for the vulnerabilities are yet to be released, impacted users can take measures to mitigate the risk by disabling the Cups-browsed service, blocking traffic to UDP port 631, and DNS-SD traffic. Shachar Menashe from JFrog Security Research recommended these steps until official patches become available.
-
Motivation4 months ago
The Top 20 Motivational Instagram Accounts to Follow (2024)
-
Tech News4 months ago
Bangladeshi police agents accused of selling citizens’ personal information on Telegram
-
Self Development4 months ago
Don’t Waste Your Time in Anger, Regrets, Worries and Grudges
-
Destination4 months ago
Our new fixed tours are your ultimate Aussie & Kiwi adventure!
-
Breaking News4 months ago
Democrats and allies to flood airwaves, drop more than $125M on abortion push
-
Activities4 months ago
Family Holiday Checklist | What To Pack Family Holiday
-
Destination4 months ago
Turkish Airlines carries 7.2 mn passengers in May, launches new sustainability brand, BA
-
Gaming4 months ago
Concord price, beta, preorder details for PS5 and PC confirmed