Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58364: CWE-20: Improper Input Validation in OpenPrinting cups

0
Medium
VulnerabilityCVE-2025-58364cvecve-2025-58364cwe-20cwe-476
Published: Thu Sep 11 2025 (09/11/2025, 17:26:25 UTC)
Source: CVE Database V5
Vendor/Project: OpenPrinting
Product: cups

Description

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe deserialization and validation of printer attributes causes null dereference in the libcups library. This is a remote DoS vulnerability available in local subnet in default configurations. It can cause the cups & cups-browsed to crash, on all the machines in local network who are listening for printers (so by default for all regular linux machines). On systems where the vulnerability CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) was not fixed, and the firewall on the machine does not reject incoming communication to IPP port, and the machine is set to be available to public internet, attack vector "Network" is possible. The current versions of CUPS and cups-browsed projects have the attack vector "Adjacent" in their default configurations. Version 2.4.13 contains a patch for CVE-2025-58364.

AI-Powered Analysis

AILast updated: 11/10/2025, 21:25:51 UTC

Technical Analysis

CVE-2025-58364 affects OpenPrinting CUPS, an open-source printing system widely used on Linux and Unix-like operating systems. The vulnerability is due to improper input validation (CWE-20) and unsafe deserialization of printer attributes, which leads to a null pointer dereference (CWE-476) in the libcups library. This flaw can be triggered remotely within the local subnet by sending crafted printer attribute data, causing cups and cups-browsed daemons to crash and resulting in denial of service. The default configuration of CUPS allows machines on the local network to listen for printer broadcasts, making all such machines susceptible. If systems have not patched the related CVE-2024-47176 vulnerability and have exposed IPP ports to the public internet without firewall restrictions, remote exploitation beyond the local subnet is possible. The vulnerability has a CVSS v3.1 base score of 6.5, indicating medium severity, with an attack vector of adjacent network, low attack complexity, no privileges or user interaction required, and impact limited to availability. The issue was fixed in version 2.4.13 of CUPS. No known exploits have been observed in the wild, but the vulnerability poses a risk of network-wide printing service disruption in affected environments.

Potential Impact

For European organizations, this vulnerability primarily threatens the availability of printing services across local networks. Organizations with extensive Linux or Unix-like infrastructure that rely on networked printers using vulnerable CUPS versions may experience widespread service outages if exploited. This can disrupt business operations, especially in sectors like government, education, healthcare, and manufacturing where printing remains critical. The risk escalates if legacy systems remain unpatched or if firewall configurations allow exposure of IPP ports to untrusted networks. Although confidentiality and integrity are not impacted, denial of service can lead to operational delays and increased support costs. The potential for network-wide impact within local subnets means that large enterprises or institutions with many interconnected devices are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits given the public disclosure.

Mitigation Recommendations

European organizations should promptly upgrade all CUPS installations to version 2.4.13 or later to apply the patch for CVE-2025-58364. Network administrators must audit firewall rules to ensure that IPP ports (typically TCP 631) are not exposed to untrusted networks, especially the public internet. Systems should be segmented to limit printer broadcast traffic to trusted subnets only. Additionally, organizations should verify that related vulnerabilities such as CVE-2024-47176 are also remediated to reduce the risk of remote exploitation. Monitoring network traffic for unusual or malformed IPP requests can help detect exploitation attempts. Employing intrusion detection/prevention systems with signatures for malformed CUPS traffic may provide early warning. Regular vulnerability scanning and asset inventory updates will help identify outdated CUPS versions. Finally, educating IT staff about the importance of patch management and network segmentation in printing infrastructure will reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-29T16:19:59.011Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c307eebb38cc0521773a82

Added to database: 9/11/2025, 5:33:34 PM

Last enriched: 11/10/2025, 9:25:51 PM

Last updated: 12/14/2025, 7:19:22 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats