Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3905-1 | cups-filters security update |
Debian DSA |
DSA-5778-1 | cups-filters security update |
Ubuntu USN |
USN-7042-1 | cups-browsed vulnerability |
Ubuntu USN |
USN-7042-2 | cups-browsed vulnerability |
Ubuntu USN |
USN-7042-3 | cups-browsed vulnerability |
Ubuntu USN |
USN-7043-1 | cups-filters vulnerabilities |
Ubuntu USN |
USN-7043-2 | cups-filters vulnerability |
Ubuntu USN |
USN-7043-3 | cups-filters vulnerability |
Ubuntu USN |
USN-7043-4 | cups-filters vulnerabilities |
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 29 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openprinting cups-browsed
|
|
| CPEs | cpe:2.3:a:openprinting:cups-browsed:2.0.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Openprinting cups-browsed
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 05 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Aus
Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus |
|
| CPEs | cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 cpe:/o:redhat:rhel_aus:7.7 |
|
| Vendors & Products |
Redhat rhel Aus
Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus |
Thu, 03 Oct 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Els
|
|
| CPEs | cpe:/o:redhat:rhel_els:7 | |
| Vendors & Products |
Redhat rhel Els
|
Wed, 02 Oct 2024 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 CWE-749 |
Wed, 02 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. Due to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. | CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to. |
| Title | cups-browsed bugs and other bugs can combine, leading to info leak and remote code execution | cups-browsed binds to `INADDR_ANY:631`, trusting any packet from any source |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 02 Oct 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:8 |
Sat, 28 Sep 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:9 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Fri, 27 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openprinting
Openprinting cups |
|
| CPEs | cpe:2.3:a:openprinting:cups:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openprinting
Openprinting cups |
|
| Metrics |
ssvc
|
Thu, 26 Sep 2024 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-940 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 26 Sep 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 26 Sep 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. Due to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. | |
| Title | cups-browsed bugs and other bugs can combine, leading to info leak and remote code execution | |
| Weaknesses | CWE-1327 CWE-20 CWE-749 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-04T21:08:56.576Z
Reserved: 2024-09-19T22:32:11.962Z
Link: CVE-2024-47176
Updated: 2025-11-04T21:08:56.576Z
Status : Modified
Published: 2024-09-26T22:15:04.497
Modified: 2025-11-04T22:16:03.920
Link: CVE-2024-47176
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN