Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47176: CWE-1327: Binding to an Unrestricted IP Address in OpenPrinting cups-browsed

0
Medium
VulnerabilityCVE-2024-47176cvecve-2024-47176cwe-1327
Published: Thu Sep 26 2024 (09/26/2024, 21:13:05 UTC)
Source: CVE Database V5
Vendor/Project: OpenPrinting
Product: cups-browsed

Description

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:48:18 UTC

Technical Analysis

CVE-2024-47176 is a vulnerability in the cups-browsed component of the CUPS (Common UNIX Printing System), an open-source printing system widely used on Linux and UNIX-like operating systems. The root cause is that cups-browsed binds its network service to INADDR_ANY on port 631, meaning it listens on all network interfaces and accepts IPP (Internet Printing Protocol) requests from any source without restriction. This unrestricted binding allows an attacker to send crafted Get-Printer-Attributes IPP requests to the service, potentially directing it to attacker-controlled URLs. While this vulnerability alone causes information integrity issues, it becomes critical when chained with other vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47177) that enable remote code execution. In such a scenario, an attacker can remotely execute arbitrary commands on the target system without requiring authentication or user interaction by exploiting the printing workflow with a malicious printer setup. The affected versions are cups-browsed up to 2.0.1. The vulnerability has a CVSS v3.1 base score of 5.3 (medium severity), reflecting its network attack vector, low attack complexity, no privileges required, and no user interaction needed. No public exploits have been reported yet, but the potential impact is significant given the ability to execute commands remotely. The vulnerability highlights the risks of binding critical services to all interfaces without proper access controls and the dangers of trusting network input in printing services.

Potential Impact

For European organizations, this vulnerability poses a moderate to high risk, especially in environments where CUPS and cups-browsed are deployed on servers or workstations connected to corporate networks. The ability for an unauthenticated attacker to send malicious IPP requests could lead to unauthorized command execution if combined with other vulnerabilities, potentially resulting in system compromise, data integrity loss, or lateral movement within the network. Organizations with extensive networked printing infrastructure, such as government agencies, educational institutions, and enterprises with Linux-based print servers, are particularly at risk. The impact includes potential disruption of printing services, unauthorized access to sensitive data, and the possibility of attackers establishing persistent footholds. Given the widespread use of CUPS in many European countries' IT environments, the vulnerability could affect critical infrastructure and business operations if exploited. The lack of known exploits in the wild provides a window for proactive mitigation, but the risk remains significant due to the ease of exploitation and lack of authentication requirements.

Mitigation Recommendations

1. Upgrade cups-browsed to a version later than 2.0.1 once patches become available from the OpenPrinting project or relevant Linux distributions. 2. Until patches are available, restrict network exposure of port 631 by firewalling or network segmentation to limit access to trusted hosts only. 3. Disable cups-browsed or the network printing service on systems where it is not required, especially on internet-facing or untrusted network segments. 4. Monitor network traffic for unusual IPP requests or connections to port 631 from untrusted sources. 5. Implement strict access control policies for printers and printing services, including authentication where possible. 6. Conduct vulnerability scanning and inventory to identify all systems running vulnerable cups-browsed versions. 7. Combine these mitigations with patching related vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47177) to prevent chained exploitation. 8. Educate IT staff about the risks of network-exposed printing services and the importance of applying security updates promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-09-19T22:32:11.962Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092b7935043901e828d3c2

Added to database: 11/3/2025, 10:23:53 PM

Last enriched: 11/3/2025, 10:48:18 PM

Last updated: 11/4/2025, 11:00:53 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats