Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58436: CWE-400: Uncontrolled Resource Consumption in OpenPrinting cups

0
Medium
VulnerabilityCVE-2025-58436cvecve-2025-58436cwe-400
Published: Sat Nov 29 2025 (11/29/2025, 02:15:53 UTC)
Source: CVE Database V5
Vendor/Project: OpenPrinting
Product: cups

Description

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients. This issue has been patched in version 2.4.15.

AI-Powered Analysis

AILast updated: 12/06/2025, 04:20:02 UTC

Technical Analysis

CVE-2025-58436 is an uncontrolled resource consumption vulnerability classified under CWE-400 affecting OpenPrinting's Common Unix Printing System (CUPS) prior to version 2.4.15. The vulnerability arises when a client connects to the cupsd daemon and sends data at an extremely slow rate, for example, one byte per second. This slow transmission causes the cupsd process to become delayed or blocked, effectively causing a denial of service (DoS) condition that impacts all clients attempting to use the printing service. The root cause is the lack of proper handling or timeout mechanisms for slow or stalled client connections, which leads to resource exhaustion within the cupsd daemon. Exploitation does not require authentication or user interaction but does require local network access to the printing service. The CVSS v3.1 base score is 5.1 (medium severity), reflecting the high attack complexity and local attack vector, with no impact on confidentiality or integrity but a significant impact on availability. No known exploits are currently reported in the wild. The issue was patched in version 2.4.15 by improving the handling of slow client connections to prevent resource exhaustion. Organizations using vulnerable versions of CUPS on Linux or Unix-like systems should prioritize upgrading to the fixed version to maintain printing service availability.

Potential Impact

For European organizations, this vulnerability primarily threatens the availability of printing services managed by CUPS on Linux and Unix-like systems. Printing infrastructure is critical in many sectors including government, healthcare, finance, and manufacturing. A successful exploitation could disrupt business operations by making printing services unavailable, potentially delaying document processing and workflows. Although the vulnerability does not compromise data confidentiality or integrity, the denial of service could indirectly affect operational continuity and productivity. Organizations with large-scale or centralized printing environments are at higher risk of significant impact. Additionally, sectors with strict compliance and audit requirements may face challenges if printing logs or records become inaccessible. The requirement for local network access limits remote exploitation but insider threats or compromised internal hosts could leverage this vulnerability. Given the medium severity and absence of known exploits, the immediate risk is moderate but warrants timely remediation to avoid service degradation or denial.

Mitigation Recommendations

1. Upgrade all CUPS installations to version 2.4.15 or later where the vulnerability is patched. 2. Implement network segmentation and firewall rules to restrict access to the cupsd service only to trusted hosts and users, minimizing exposure to potentially malicious clients. 3. Configure timeout settings and connection limits on the cupsd daemon to detect and drop slow or stalled connections more aggressively, if configurable. 4. Monitor printing service logs and network traffic for unusual connection patterns, such as slow or partial data transmissions, which may indicate attempted exploitation. 5. Employ host-based intrusion detection systems (HIDS) to alert on abnormal resource consumption by the cupsd process. 6. Educate internal users and administrators about the risk of local network attacks and enforce strict access controls on internal networks. 7. Regularly audit and update printing infrastructure components as part of vulnerability management programs to ensure timely patching.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-09-01T20:03:06.532Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692a5c732a13ea799fd8c854

Added to database: 11/29/2025, 2:37:39 AM

Last enriched: 12/6/2025, 4:20:02 AM

Last updated: 1/19/2026, 4:22:31 AM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats