Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58436: CWE-400: Uncontrolled Resource Consumption in OpenPrinting cups

0
Medium
VulnerabilityCVE-2025-58436cvecve-2025-58436cwe-400
Published: Sat Nov 29 2025 (11/29/2025, 02:15:53 UTC)
Source: CVE Database V5
Vendor/Project: OpenPrinting
Product: cups

Description

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients. This issue has been patched in version 2.4.15.

AI-Powered Analysis

AILast updated: 11/29/2025, 02:53:22 UTC

Technical Analysis

CVE-2025-58436 is an uncontrolled resource consumption vulnerability (CWE-400) affecting OpenPrinting CUPS, an open-source printing system widely used on Linux and Unix-like operating systems. The flaw exists in versions prior to 2.4.15, where a client connecting to the cupsd daemon can deliberately send data at an extremely slow rate (e.g., one byte per second). This slow transmission causes the cupsd process to become delayed and unresponsive, effectively causing a denial of service (DoS) condition for all other clients attempting to use the printing service. The vulnerability arises because cupsd does not properly handle or limit the resource consumption caused by these slow connections, leading to resource exhaustion and service degradation. Exploitation requires local network access to the printing service but does not require authentication or user interaction. The CVSS v3.1 score of 5.1 reflects a medium severity, with the attack vector being local (AV:L), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and the issue has been addressed in CUPS version 2.4.15. The vulnerability could be leveraged by an attacker to disrupt printing services, impacting business operations that rely on timely print jobs.

Potential Impact

For European organizations, this vulnerability primarily threatens the availability of printing services on Linux and Unix-like systems running vulnerable CUPS versions. Disruption of printing services can affect administrative, operational, and compliance-related workflows, especially in sectors such as government, healthcare, finance, and manufacturing where printed documentation remains critical. Organizations with centralized print servers or networked printing infrastructure are particularly vulnerable to denial of service conditions caused by slow client connections. While the vulnerability does not compromise data confidentiality or integrity, the loss of printing availability can delay critical processes, reduce productivity, and potentially impact regulatory compliance where printed records are required. Additionally, in environments where printing services are integrated with other IT systems, service disruption could cascade, affecting broader operational continuity. The requirement for local access limits remote exploitation but insider threats or compromised internal hosts could exploit this flaw to degrade service.

Mitigation Recommendations

To mitigate CVE-2025-58436, European organizations should immediately upgrade all affected CUPS installations to version 2.4.15 or later, where the vulnerability has been patched. Network segmentation and access controls should be enforced to restrict access to the cupsd service only to trusted hosts and users, minimizing the risk of malicious slow connections. Implementing connection timeouts and rate limiting on the cupsd daemon can help prevent resource exhaustion from slow clients. Monitoring and alerting for abnormal connection patterns, such as clients sending data at unusually slow rates, can enable early detection of exploitation attempts. Organizations should also review and harden local network security to prevent unauthorized access to printing services. Regular vulnerability scanning and patch management processes should be maintained to ensure timely updates. In environments with high security requirements, consider isolating printing services on dedicated subnets or virtual LANs to reduce exposure. Finally, educating IT staff about this vulnerability and its impact will help ensure rapid response if exploitation is suspected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-09-01T20:03:06.532Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692a5c732a13ea799fd8c854

Added to database: 11/29/2025, 2:37:39 AM

Last enriched: 11/29/2025, 2:53:22 AM

Last updated: 12/4/2025, 11:00:41 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats