Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47850: n/a

0
High
VulnerabilityCVE-2024-47850cvecve-2024-47850
Published: Fri Oct 04 2024 (10/04/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:34:05 UTC

Technical Analysis

CVE-2024-47850 is a vulnerability affecting cups-browsed, a component of the Common UNIX Printing System (CUPS) responsible for discovering and managing network printers. In versions prior to 2.5b1, cups-browsed responds to a single IPP (Internet Printing Protocol) UDP packet requesting a printer to be added by sending an HTTP POST request to an arbitrary destination and port specified by the attacker. This behavior is distinct from CVE-2024-47176 and can be leveraged to perform Distributed Denial of Service (DDoS) amplification attacks. The vulnerability arises because the service acts as an open reflector, allowing attackers to amplify traffic towards victim systems by spoofing IPP UDP packets. The CVSS 3.1 score of 7.5 reflects high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). The weakness is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that the vulnerability can cause resource exhaustion or service disruption. No patches or exploits are currently publicly available, but the risk remains significant due to the ease of exploitation and potential for large-scale DDoS attacks leveraging multiple vulnerable hosts.

Potential Impact

The primary impact of CVE-2024-47850 is on the availability of network resources and services. Attackers can exploit this vulnerability to launch DDoS amplification attacks by sending crafted IPP UDP packets to vulnerable cups-browsed instances, which in turn send HTTP POST requests to arbitrary targets. This can overwhelm victim systems or networks, causing service outages and degraded performance. Organizations with exposed CUPS services, especially those in enterprise, government, or critical infrastructure sectors, may experience significant disruption. Additionally, the vulnerability could be used as part of a larger multi-vector DDoS campaign, complicating mitigation efforts. While confidentiality and integrity are not directly affected, the availability impact can indirectly affect business operations, customer trust, and compliance with service level agreements. The lack of required authentication or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation if vulnerable systems are exposed to untrusted networks.

Mitigation Recommendations

1. Upgrade cups-browsed to version 2.5b1 or later as soon as the patch becomes available to eliminate the vulnerability. 2. In the interim, restrict network access to IPP UDP ports (typically UDP port 631) using firewalls or network ACLs to limit exposure to untrusted networks. 3. Implement ingress and egress filtering to prevent IP address spoofing, which is essential to mitigate reflection and amplification attacks. 4. Monitor network traffic for unusual spikes in HTTP POST requests originating from CUPS servers or unexpected IPP UDP packets. 5. Disable cups-browsed or related printer discovery services on systems where network printing is not required or where printers are statically configured. 6. Employ rate limiting on network devices to control the volume of traffic generated by printer services. 7. Coordinate with ISPs and upstream providers to detect and mitigate DDoS traffic leveraging this vulnerability. 8. Conduct regular vulnerability scanning and penetration testing to identify and remediate exposed CUPS services.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d09b7ef31ef0b56d635

Added to database: 2/25/2026, 9:43:37 PM

Last enriched: 2/28/2026, 7:34:05 AM

Last updated: 4/12/2026, 3:43:08 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses