A critical security vulnerability (score of 9.9) has been discovered on Linux. The vulnerability concerns the Linux print server CUPS.
The following CVEs have been assigned to this vulnerability: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175 and CVE-2024-47177. Additional CVEs may be added.
What we know about the vulnerability
This vulnerability is of type RCE. Exploiting this type of vulnerability enables an attacker to remotely execute system code (computer program) that will impact the attacked system.
Note that the attacker does not need to be authenticated to exploit an RCE vulnerability. In other words, the attack can succeed even if you use a very complex password with the MFA to access the server containing the RCE vulnerability.
How to exploit the vulnerability
This RCE vulnerability can be exploited remotely via a UDP packet on port 631 without the attacker being authenticated, if port CUPS/631 is open on the Linux machine and is allowed in your firewall.
Vulnerable Linux versions
Details to follow.
Considerations for vulnerabilities with a score of 9.9
Since the vulnerability score is very high (9.9 on a scale of 10), this means that:
Recommendation
What Streamscan can do to protect you
If you're a Streamscan partner :
Next steps