Description
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
Published: 2024-09-26
Score: 5.3 Medium
EPSS: 87.6% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3905-1 cups-filters security update
Debian DSA Debian DSA DSA-5778-1 cups-filters security update
Ubuntu USN Ubuntu USN USN-7042-1 cups-browsed vulnerability
Ubuntu USN Ubuntu USN USN-7042-2 cups-browsed vulnerability
Ubuntu USN Ubuntu USN USN-7042-3 cups-browsed vulnerability
Ubuntu USN Ubuntu USN USN-7043-1 cups-filters vulnerabilities
Ubuntu USN Ubuntu USN USN-7043-2 cups-filters vulnerability
Ubuntu USN Ubuntu USN USN-7043-3 cups-filters vulnerability
Ubuntu USN Ubuntu USN USN-7043-4 cups-filters vulnerabilities
History

Tue, 04 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Mon, 03 Nov 2025 23:30:00 +0000


Mon, 29 Sep 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Openprinting cups-browsed
CPEs cpe:2.3:a:openprinting:cups-browsed:2.0.1:*:*:*:*:*:*:*
Vendors & Products Openprinting cups-browsed

Fri, 22 Nov 2024 12:00:00 +0000


Sat, 05 Oct 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Eus
Redhat rhel Tus
CPEs cpe:/a:redhat:rhel_aus:8.2
cpe:/a:redhat:rhel_aus:8.4
cpe:/a:redhat:rhel_aus:8.6
cpe:/a:redhat:rhel_e4s:8.4
cpe:/a:redhat:rhel_e4s:8.6
cpe:/a:redhat:rhel_e4s:9.0
cpe:/a:redhat:rhel_eus:8.8
cpe:/a:redhat:rhel_eus:9.2
cpe:/a:redhat:rhel_tus:8.4
cpe:/a:redhat:rhel_tus:8.6
cpe:/o:redhat:rhel_aus:7.7
Vendors & Products Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Eus
Redhat rhel Tus

Thu, 03 Oct 2024 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Els
CPEs cpe:/o:redhat:rhel_els:7
Vendors & Products Redhat rhel Els

Wed, 02 Oct 2024 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-749

Wed, 02 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Description CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. Due to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
Title cups-browsed bugs and other bugs can combine, leading to info leak and remote code execution cups-browsed binds to `INADDR_ANY:631`, trusting any packet from any source
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Wed, 02 Oct 2024 02:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:8

Sat, 28 Sep 2024 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux

Fri, 27 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Openprinting
Openprinting cups
CPEs cpe:2.3:a:openprinting:cups:*:*:*:*:*:*:*:*
Vendors & Products Openprinting
Openprinting cups
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Sep 2024 23:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-940
References
Metrics threat_severity

None

threat_severity

Important


Thu, 26 Sep 2024 22:15:00 +0000


Thu, 26 Sep 2024 21:30:00 +0000

Type Values Removed Values Added
Description CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. Due to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled.
Title cups-browsed bugs and other bugs can combine, leading to info leak and remote code execution
Weaknesses CWE-1327
CWE-20
CWE-749
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}


Subscriptions

Openprinting Cups Cups-browsed
Redhat Enterprise Linux Rhel Aus Rhel E4s Rhel Els Rhel Eus Rhel Tus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-04T21:08:56.576Z

Reserved: 2024-09-19T22:32:11.962Z

Link: CVE-2024-47176

cve-icon Vulnrichment

Updated: 2025-11-04T21:08:56.576Z

cve-icon NVD

Status : Modified

Published: 2024-09-26T22:15:04.497

Modified: 2025-11-04T22:16:03.920

Link: CVE-2024-47176

cve-icon Redhat

Severity : Important

Publid Date: 2024-09-26T20:00:00Z

Links: CVE-2024-47176 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses