Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47175: CWE-20: Improper Input Validation in OpenPrinting libppd

0
High
VulnerabilityCVE-2024-47175cvecve-2024-47175cwe-20
Published: Thu Sep 26 2024 (09/26/2024, 21:18:25 UTC)
Source: CVE Database V5
Vendor/Project: OpenPrinting
Product: libppd

Description

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:47:51 UTC

Technical Analysis

CVE-2024-47175 is a vulnerability in the OpenPrinting project's libppd library, which is part of the CUPS printing system widely used on Unix-like operating systems. The vulnerability arises from improper input validation (CWE-20) in the function ppdCreatePPDFromIPP2, which processes IPP (Internet Printing Protocol) attributes to create PPD (PostScript Printer Description) buffers. Specifically, the function does not sanitize user-controlled IPP attributes, allowing maliciously crafted input to influence the PPD buffer content. When combined with other functions such as cfGetPrinterAttributes5, this can lead to an exploit chain culminating in code execution via the Foomatic filter, a component used for printer driver support. The vulnerability affects libppd versions up to and including 2.1b1. The CVSS 3.1 base score is 8.6, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) with no confidentiality impact but high integrity impact (I:H) and no availability impact (A:N). Although no known exploits are currently in the wild, the vulnerability's characteristics suggest it could be weaponized for remote code execution without authentication, making it a significant threat to systems exposing CUPS services. The lack of patches at the time of publication means organizations must rely on mitigations until updates are released.

Potential Impact

For European organizations, the impact of CVE-2024-47175 can be substantial, especially in environments where CUPS is deployed extensively for network printing services, including enterprises, government agencies, and educational institutions. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to system compromise, lateral movement within networks, and data integrity breaches. Since printing services often run with elevated privileges or have access to sensitive documents, the integrity impact is high. The vulnerability does not affect confidentiality directly but can be leveraged as a foothold for further attacks. Disruption of printing services could also affect business continuity. Given the network attack vector and no requirement for authentication, attackers can exploit exposed printing services remotely, increasing the risk for organizations with poorly segmented or exposed network printing infrastructure. The absence of user interaction requirements further elevates the threat level. Organizations relying on legacy PPD support are particularly vulnerable, as this functionality is directly implicated.

Mitigation Recommendations

1. Monitor OpenPrinting and CUPS project channels for official patches addressing CVE-2024-47175 and apply updates promptly once available. 2. Until patches are released, restrict network access to CUPS services by implementing firewall rules limiting connections to trusted hosts and networks only. 3. Disable legacy PPD support or the libppd component if not strictly necessary, reducing the attack surface. 4. Employ network segmentation to isolate printing infrastructure from critical systems and sensitive data environments. 5. Enable detailed logging and monitor print job submissions and IPP attribute requests for anomalous or unexpected patterns indicative of exploitation attempts. 6. Conduct internal vulnerability scans and penetration tests focusing on printing services to identify exposure. 7. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving printing system compromise. 8. Consider deploying application-layer firewalls or intrusion detection systems capable of inspecting IPP traffic for malicious payloads. 9. Review and harden printer configurations, removing unnecessary services and disabling remote administration features where possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-09-19T22:32:11.962Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092b7835043901e828cb60

Added to database: 11/3/2025, 10:23:52 PM

Last enriched: 11/3/2025, 10:47:51 PM

Last updated: 11/4/2025, 11:23:55 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats