CVE-2024-47176

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openprinting:cups-browsed:2.0.1:*:*:*:*:*:*:*

History

29 Sep 2025, 13:07

Type Values Removed Values Added
First Time Openprinting
Openprinting cups-browsed
References () https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992 - () https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992 - Product
References () https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8 - () https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8 - Exploit, Vendor Advisory
References () https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47 - () https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47 - Not Applicable
References () https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5 - () https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5 - Not Applicable
References () https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6 - () https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6 - Not Applicable
References () https://www.cups.org - () https://www.cups.org - Product
References () https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I - () https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I - Exploit, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/27/6 - () http://www.openwall.com/lists/oss-security/2024/09/27/6 - Mailing List
References () https://github.com/OpenPrinting/cups-browsed/commit/1debe6b140c37e0aa928559add4abcc95ce54aa2 - () https://github.com/OpenPrinting/cups-browsed/commit/1debe6b140c37e0aa928559add4abcc95ce54aa2 - Patch
CPE cpe:2.3:a:openprinting:cups-browsed:2.0.1:*:*:*:*:*:*:*

21 Nov 2024, 09:39

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/09/27/6 -
  • () https://github.com/OpenPrinting/cups-browsed/commit/1debe6b140c37e0aa928559add4abcc95ce54aa2 -

02 Oct 2024, 20:15

Type Values Removed Values Added
CWE CWE-749
CWE-20

02 Oct 2024, 19:15

Type Values Removed Values Added
Summary (en) CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. Due to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. (en) CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
CVSS v2 : unknown
v3 : 8.3
v2 : unknown
v3 : 5.3

26 Sep 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-26 22:15

Updated : 2025-09-29 13:07


NVD link : CVE-2024-47176

Mitre link : CVE-2024-47176

CVE.ORG link : CVE-2024-47176


JSON object : View

Products Affected

openprinting

  • cups-browsed
CWE
CWE-1327

Binding to an Unrestricted IP Address