CVE-2025-58436: CWE-400: Uncontrolled Resource Consumption in OpenPrinting cups
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients. This issue has been patched in version 2.4.15.
AI Analysis
Technical Summary
CVE-2025-58436 is an uncontrolled resource consumption vulnerability (CWE-400) affecting OpenPrinting CUPS, an open-source printing system widely used on Linux and Unix-like operating systems. The flaw exists in versions prior to 2.4.15, where a client connecting to the cupsd daemon can deliberately send data at an extremely slow rate (e.g., one byte per second). This slow transmission causes the cupsd process to become delayed and unresponsive, effectively causing a denial of service (DoS) condition for all other clients attempting to use the printing service. The vulnerability arises because cupsd does not properly handle or limit the resource consumption caused by these slow connections, leading to resource exhaustion and service degradation. Exploitation requires local network access to the printing service but does not require authentication or user interaction. The CVSS v3.1 score of 5.1 reflects a medium severity, with the attack vector being local (AV:L), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and the issue has been addressed in CUPS version 2.4.15. The vulnerability could be leveraged by an attacker to disrupt printing services, impacting business operations that rely on timely print jobs.
Potential Impact
For European organizations, this vulnerability primarily threatens the availability of printing services on Linux and Unix-like systems running vulnerable CUPS versions. Disruption of printing services can affect administrative, operational, and compliance-related workflows, especially in sectors such as government, healthcare, finance, and manufacturing where printed documentation remains critical. Organizations with centralized print servers or networked printing infrastructure are particularly vulnerable to denial of service conditions caused by slow client connections. While the vulnerability does not compromise data confidentiality or integrity, the loss of printing availability can delay critical processes, reduce productivity, and potentially impact regulatory compliance where printed records are required. Additionally, in environments where printing services are integrated with other IT systems, service disruption could cascade, affecting broader operational continuity. The requirement for local access limits remote exploitation but insider threats or compromised internal hosts could exploit this flaw to degrade service.
Mitigation Recommendations
To mitigate CVE-2025-58436, European organizations should immediately upgrade all affected CUPS installations to version 2.4.15 or later, where the vulnerability has been patched. Network segmentation and access controls should be enforced to restrict access to the cupsd service only to trusted hosts and users, minimizing the risk of malicious slow connections. Implementing connection timeouts and rate limiting on the cupsd daemon can help prevent resource exhaustion from slow clients. Monitoring and alerting for abnormal connection patterns, such as clients sending data at unusually slow rates, can enable early detection of exploitation attempts. Organizations should also review and harden local network security to prevent unauthorized access to printing services. Regular vulnerability scanning and patch management processes should be maintained to ensure timely updates. In environments with high security requirements, consider isolating printing services on dedicated subnets or virtual LANs to reduce exposure. Finally, educating IT staff about this vulnerability and its impact will help ensure rapid response if exploitation is suspected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-58436: CWE-400: Uncontrolled Resource Consumption in OpenPrinting cups
Description
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients. This issue has been patched in version 2.4.15.
AI-Powered Analysis
Technical Analysis
CVE-2025-58436 is an uncontrolled resource consumption vulnerability (CWE-400) affecting OpenPrinting CUPS, an open-source printing system widely used on Linux and Unix-like operating systems. The flaw exists in versions prior to 2.4.15, where a client connecting to the cupsd daemon can deliberately send data at an extremely slow rate (e.g., one byte per second). This slow transmission causes the cupsd process to become delayed and unresponsive, effectively causing a denial of service (DoS) condition for all other clients attempting to use the printing service. The vulnerability arises because cupsd does not properly handle or limit the resource consumption caused by these slow connections, leading to resource exhaustion and service degradation. Exploitation requires local network access to the printing service but does not require authentication or user interaction. The CVSS v3.1 score of 5.1 reflects a medium severity, with the attack vector being local (AV:L), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and the issue has been addressed in CUPS version 2.4.15. The vulnerability could be leveraged by an attacker to disrupt printing services, impacting business operations that rely on timely print jobs.
Potential Impact
For European organizations, this vulnerability primarily threatens the availability of printing services on Linux and Unix-like systems running vulnerable CUPS versions. Disruption of printing services can affect administrative, operational, and compliance-related workflows, especially in sectors such as government, healthcare, finance, and manufacturing where printed documentation remains critical. Organizations with centralized print servers or networked printing infrastructure are particularly vulnerable to denial of service conditions caused by slow client connections. While the vulnerability does not compromise data confidentiality or integrity, the loss of printing availability can delay critical processes, reduce productivity, and potentially impact regulatory compliance where printed records are required. Additionally, in environments where printing services are integrated with other IT systems, service disruption could cascade, affecting broader operational continuity. The requirement for local access limits remote exploitation but insider threats or compromised internal hosts could exploit this flaw to degrade service.
Mitigation Recommendations
To mitigate CVE-2025-58436, European organizations should immediately upgrade all affected CUPS installations to version 2.4.15 or later, where the vulnerability has been patched. Network segmentation and access controls should be enforced to restrict access to the cupsd service only to trusted hosts and users, minimizing the risk of malicious slow connections. Implementing connection timeouts and rate limiting on the cupsd daemon can help prevent resource exhaustion from slow clients. Monitoring and alerting for abnormal connection patterns, such as clients sending data at unusually slow rates, can enable early detection of exploitation attempts. Organizations should also review and harden local network security to prevent unauthorized access to printing services. Regular vulnerability scanning and patch management processes should be maintained to ensure timely updates. In environments with high security requirements, consider isolating printing services on dedicated subnets or virtual LANs to reduce exposure. Finally, educating IT staff about this vulnerability and its impact will help ensure rapid response if exploitation is suspected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-01T20:03:06.532Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692a5c732a13ea799fd8c854
Added to database: 11/29/2025, 2:37:39 AM
Last enriched: 11/29/2025, 2:53:22 AM
Last updated: 12/4/2025, 11:00:41 PM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighCVE-2025-66563: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in monkeytypegame monkeytype
HighCVE-2025-66561: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Syslifters sysreptor
HighCVE-2025-14051: Improper Control of Dynamically-Identified Variables in youlaitech youlai-mall
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.