Patch
CVE-2024-47076
with vRx
Introduction
Following the discovery of multiple significant vulnerabilities in CUPS (Common UNIX Printing System), system administrators must act immediately to reduce possible hazards. These vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177) make systems vulnerable to remote code execution (RCE) attacks. This blog will go over a remediation script that helps protect your system by stopping vulnerable services, preventing critical attack routes, and minimizing risks until fixes become available.
Overview of CVEs
CVE-2024-47076: Improper validation of IPP characteristics in libcupsfilters enables attacker-controlled data to be sent to CUPS.
CVE-2024-47175: The libppd library fails to sanitize IPP data while creating PostScript Printer Description (PPD) files, leading to the introduction of malicious code.
CVE-2024-47176: The cups-browsed service connects to all accessible IP addresses, exposing UDP port 631 and receiving possibly malicious IPP packets.
CVE-2024-47177 involves arbitrary command execution with the FoomaticRIPCommandLine PPD parameter in cups-filters.
Remediation Strategy
To mitigate these vulnerabilities, the following measures are required.
Stop and deactivate the cup-browsed service. This prevents the service from listening for malicious IPP packets on UDP port 631.
Block UDP port 631. This lowers the likelihood of remote attackers abusing the open port.
Ensure that services are not resumed during reboot. Disabling the services permanently will protect your machine during reboots.
How the Script Works
Stops the cups-browsed Service: This prevents the system from accepting IPP packets from potentially malicious sources.
Disables the Service: This ensures the cups-browsed service does not start again during reboot, maintaining the system's protection.
Blocks UDP Port 631: Closing this port prevents external attackers from exploiting it to gain access via IPP.
Reloads Firewall Rules: Ensures that changes made by UFW are active immediately.
Running the Script
Save the script as remediation.py.
Run it with root privileges:
sudo python3 remediation.py
Conclusion
This script provides a quick and effective way to reduce your system’s exposure to the CUPS vulnerabilities discovered in 2024.By stopping vulnerable services, disabling automatic restarts, and blocking critical ports, administrators can significantly lower the risk of exploitation until patches are available from Linux distribution maintainers.
Staying vigilant and regularly applying security updates is essential for keeping systems safe. Make sure to follow up with vendor patches once they are released to fully resolve the vulnerabilities
Read more
Read less
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Remediate faster with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.