Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47176: CWE-1327: Binding to an Unrestricted IP Address in OpenPrinting cups-browsed

0
Medium
VulnerabilityCVE-2024-47176cvecve-2024-47176cwe-1327
Published: Thu Sep 26 2024 (09/26/2024, 21:13:05 UTC)
Source: CVE Database V5
Vendor/Project: OpenPrinting
Product: cups-browsed

Description

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

AI-Powered Analysis

AILast updated: 11/10/2025, 23:03:00 UTC

Technical Analysis

CVE-2024-47176 affects the cups-browsed component of the OpenPrinting system, which is responsible for network printing functionalities including auto-discovery of print services and shared printers. The vulnerability arises because cups-browsed binds its listening socket to INADDR_ANY on port 631, meaning it listens on all network interfaces without restriction. This design flaw allows the service to accept IPP (Internet Printing Protocol) requests from any source IP address, including potentially malicious external hosts. Specifically, an attacker can send a crafted Get-Printer-Attributes IPP request to a URL controlled by the attacker. While this alone does not directly lead to code execution, it sets the stage for exploitation when combined with other vulnerabilities in the same component (CVE-2024-47076, CVE-2024-47175, CVE-2024-47177). Together, these vulnerabilities enable an attacker to execute arbitrary commands remotely on the target system without requiring authentication or user interaction. The affected versions are cups-browsed versions up to 2.0.1. The CVSS v3.1 score is 5.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on integrity but no impact on confidentiality or availability. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The root cause is categorized under CWE-1327, which involves binding to an unrestricted IP address, leading to exposure of services to untrusted networks.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily in environments where cups-browsed is deployed on networked printing infrastructure accessible from untrusted networks or segments. The ability for an unauthenticated attacker to send malicious IPP requests could lead to unauthorized command execution when combined with other vulnerabilities, potentially compromising print servers and connected systems. This could result in disruption of printing services, unauthorized access to sensitive documents, lateral movement within internal networks, and potential data integrity issues. Organizations with large-scale print deployments, especially in sectors like government, finance, healthcare, and manufacturing, may face increased risk due to the critical nature of printing infrastructure. The vulnerability could also be leveraged as an initial foothold for further attacks if exploited in combination with the related CVEs. However, the absence of known exploits in the wild and the medium severity rating suggest that immediate widespread impact is limited but should not be underestimated.

Mitigation Recommendations

1. Upgrade cups-browsed to a version later than 2.0.1 once patches become available from the OpenPrinting project or your Linux distribution vendor. 2. Until patches are applied, restrict network access to port 631 on systems running cups-browsed by implementing firewall rules that limit connections to trusted internal IP addresses only. 3. Disable cups-browsed or the network printing service on systems where it is not required, especially on publicly accessible or untrusted network interfaces. 4. Monitor network traffic for unusual IPP requests or connections to port 631 from unexpected sources. 5. Employ network segmentation to isolate print servers from critical infrastructure and sensitive data environments. 6. Review and apply security best practices for print server hardening, including disabling unnecessary features and enabling logging and alerting for suspicious activities. 7. Stay informed about updates regarding the related vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47177) and apply combined patches promptly to prevent chained exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-09-19T22:32:11.962Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092b7935043901e828d3c2

Added to database: 11/3/2025, 10:23:53 PM

Last enriched: 11/10/2025, 11:03:00 PM

Last updated: 12/19/2025, 11:49:34 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats