Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58060: CWE-287: Improper Authentication in OpenPrinting cups

0
High
VulnerabilityCVE-2025-58060cvecve-2025-58060cwe-287
Published: Thu Sep 11 2025 (09/11/2025, 17:06:32 UTC)
Source: CVE Database V5
Vendor/Project: OpenPrinting
Product: cups

Description

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, when the `AuthType` is set to anything but `Basic`, if the request contains an `Authorization: Basic ...` header, the password is not checked. This results in authentication bypass. Any configuration that allows an `AuthType` that is not `Basic` is affected. Version 2.4.13 fixes the issue.

AI-Powered Analysis

AILast updated: 11/10/2025, 21:25:28 UTC

Technical Analysis

CVE-2025-58060 is an authentication bypass vulnerability in the OpenPrinting CUPS (Common UNIX Printing System) software, affecting versions earlier than 2.4.13. The vulnerability arises from improper handling of the Authorization header when the AuthType configuration is set to any value other than Basic. Specifically, if a client sends an Authorization: Basic header, the system fails to validate the password, effectively bypassing authentication checks. This flaw is categorized under CWE-287 (Improper Authentication). The vulnerability allows an attacker with local network or system access to perform unauthorized actions on the printing system, such as submitting print jobs, modifying printer configurations, or potentially escalating privileges depending on the deployment context. The CVSS v3.1 score is 8.0 (high), reflecting the local attack vector, low attack complexity, no privileges required, no user interaction, and significant impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and fixed in version 2.4.13. The issue is critical in environments where CUPS is exposed to multiple users or network segments, as it undermines the authentication mechanism designed to protect printing resources.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security and reliability of printing infrastructure, especially in sectors where sensitive documents are handled, such as government, finance, healthcare, and critical infrastructure. Unauthorized access to printing services can lead to leakage of confidential information, unauthorized document printing or modification, and disruption of printing availability. In multi-user environments like universities, enterprises, or public institutions, attackers could exploit this flaw to bypass authentication and perform malicious actions without detection. The impact extends to potential lateral movement within networks if attackers leverage compromised printing systems as footholds. Given the widespread use of Linux and Unix-like systems in European IT environments, the vulnerability could affect a broad range of organizations, particularly those with outdated CUPS versions. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure.

Mitigation Recommendations

European organizations should immediately verify their CUPS versions and upgrade to version 2.4.13 or later, where the authentication bypass is fixed. For environments where immediate patching is not feasible, administrators should review and restrict AuthType configurations to Basic only, if compatible with operational requirements, to avoid triggering the vulnerability. Network segmentation and access controls should be enforced to limit local network access to printing servers, reducing the attack surface. Monitoring and logging of printing service access should be enhanced to detect unusual or unauthorized activities. Additionally, organizations should implement strict user access policies and consider deploying host-based intrusion detection systems to identify exploitation attempts. Regular vulnerability scanning and configuration audits focusing on CUPS and related services are recommended to ensure compliance and early detection of vulnerable instances.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-22T14:30:32.222Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c307eebb38cc0521773a86

Added to database: 9/11/2025, 5:33:34 PM

Last enriched: 11/10/2025, 9:25:28 PM

Last updated: 12/13/2025, 7:20:46 AM

Views: 161

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats