Patch

CVE-2024-47176

with vRx

Vulnerability Overview
CVE Name
CVE-2024-47176
Severity
5.3
Medium
CVE Description
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust...
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust...
Show more
Show less
Latest Patch info
There is no patch available at the moment, but you can use our script.
Patch Name
Date
Script
Script Type
Remediation script
Introduction Following the discovery of multiple significant vulnerabilities in CUPS (Common UNIX Printing System), system administrators must act immediately to reduce possible hazards. These vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177) make systems vulnerable to remote code execution (RCE) attacks. This blog will go over a remediation script that helps protect your system by stopping vulnerable services, preventing critical attack routes, and minimizing risks until fixes become available. Overview of CVEs CVE-2024-47076: Improper validation of IPP characteristics in libcupsfilters enables attacker-controlled data to be sent to CUPS. CVE-2024-47175: The libppd library fails to sanitize IPP data while creating PostScript Printer Description (PPD) files, leading to the introduction of malicious code. CVE-2024-47176: The cups-browsed service connects to all accessible IP addresses, exposing UDP port 631 and receiving possibly malicious IPP packets. CVE-2024-47177 involves arbitrary command execution with the FoomaticRIPCommandLine PPD parameter in cups-filters. Remediation Strategy To mitigate these vulnerabilities, the following measures are required. Stop and deactivate the cup-browsed service. This prevents the service from listening for malicious IPP packets on UDP port 631. Block UDP port 631. This lowers the likelihood of remote attackers abusing the open port. Ensure that services are not resumed during reboot. Disabling the services permanently will protect your machine during reboots. How the Script Works Stops the cups-browsed Service: This prevents the system from accepting IPP packets from potentially malicious sources. Disables the Service: This ensures the cups-browsed service does not start again during reboot, maintaining the system's protection. Blocks UDP Port 631: Closing this port prevents external attackers from exploiting it to gain access via IPP. Reloads Firewall Rules: Ensures that changes made by UFW are active immediately. Running the Script Save the script as remediation.py. Run it with root privileges: sudo python3 remediation.py Conclusion This script provides a quick and effective way to reduce your system’s exposure to the CUPS vulnerabilities discovered in 2024.By stopping vulnerable services, disabling automatic restarts, and blocking critical ports, administrators can significantly lower the risk of exploitation until patches are available from Linux distribution maintainers. Staying vigilant and regularly applying security updates is essential for keeping systems safe. Make sure to follow up with vendor patches once they are released to fully resolve the vulnerabilities​
Introduction Following the discovery of multiple significant vulnerabilities in CUPS (Common UNIX Printing System), system administrators must act immediately to reduce possible hazards. These vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177) make systems vulnerable to remote code execution (RCE) attacks. This blog will go over a remediation script that helps protect your system by stopping vulnerable services, preventing critical attack routes, and minimizing risks until fixes become available. Overview of CVEs CVE-2024-47076: Improper validation of IPP characteristics in libcupsfilters enables attacker-controlled data to be sent to CUPS. CVE-2024-47175: The libppd library fails to sanitize IPP data while creating PostScript Printer Description (PPD) files, leading to the introduction of malicious code. CVE-2024-47176: The cups-browsed service connects to all accessible IP addresses, exposing UDP port 631 and receiving possibly malicious IPP packets. CVE-2024-47177 involves arbitrary command execution with the FoomaticRIPCommandLine PPD parameter in cups-filters. Remediation Strategy To mitigate these vulnerabilities, the following measures are required. Stop and deactivate the cup-browsed service. This prevents the service from listening for malicious IPP packets on UDP port 631. Block UDP port 631. This lowers the likelihood of remote attackers abusing the open port. Ensure that services are not resumed during reboot. Disabling the services permanently will protect your machine during reboots. How the Script Works Stops the cups-browsed Service: This prevents the system from accepting IPP packets from potentially malicious sources. Disables the Service: This ensures the cups-browsed service does not start again during reboot, maintaining the system's protection. Blocks UDP Port 631: Closing this port prevents external attackers from exploiting it to gain access via IPP. Reloads Firewall Rules: Ensures that changes made by UFW are active immediately. Running the Script Save the script as remediation.py. Run it with root privileges: sudo python3 remediation.py Conclusion This script provides a quick and effective way to reduce your system’s exposure to the CUPS vulnerabilities discovered in 2024.By stopping vulnerable services, disabling automatic restarts, and blocking critical ports, administrators can significantly lower the risk of exploitation until patches are available from Linux distribution maintainers. Staying vigilant and regularly applying security updates is essential for keeping systems safe. Make sure to follow up with vendor patches once they are released to fully resolve the vulnerabilities​
Affected OS & Apps
No items found.
No items found.
Show more
4.8

Patch faster and smarter
with vRx

Book a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Trusted by 600+ customers:

Solution

Remediate faster with vRx

Patch Management

vRx automatically deploys patches across all systems, cutting patching time by 80%.

Scripting Engine

vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.

Patchless Protection

vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.
Shortlist 2024 by Captera
4.9
Customer first by Gartner
4.8
Leader spring by G2
4.9

Hear from our Customers

Consolidation & third-party patching is particularly valuable

"With vRx, we can patch in real time, especially for our end-user systems—reducing our remediation cycle from once every three months to within the week."
Michael SutherlandMichael Sutherland
Michael Sutherland
IT Security Manager

Valuable resources saved

"Before vRx, we would spend countless hours manually finding and verifying patches. We saved so much time (and headache!)."
Anonymous IT Operations LeadAnonymous IT Operations Lead
Anonymous IT Operations Lead
IT Operations Lead

Third-party software patching is the most valuable feature.

"We have automated third-party patching on specific software, improving efficiency by 80%. vRx has reduced our patching time, which has improved our operations. It is more robust than other solutions because it offers better third-party remediation."
Billy TurnerBilly Turner
Billy Turner
VP, Managed Technology & Services

Single source of truth, capable of handling any application in our fleet

"vRx gives a single pane of glass to see what patches needed to go out and what sort of vulnerabilities we have on our Windows machines. Our meantime to remediate vulnerabilities has gone down by about 60% to 70%."
Peter FallowfieldPeter Fallowfield
Peter Fallowfield
IT Manager

60% faster remediation, many hours saved

"Typically, with our previous solution of ManageEngine, it took about three hours to patch Windows Server, and now, that is less than an hour. It means less downtime for the business each month when we do patches."
Anonymous Security AnalystAnonymous Security Analyst
Anonymous Security Analyst
Security Analyst

Great patching capabilities, helpful dashboard, and excellent support

"vRx has saved us an incredible amount of time. We can just rely on the automated system and the schedules we've set. It's a huge time saver. It's saved us hundreds of hours."
Michael CortezMichael Cortez
Michael Cortez
Sr. Director of IT

My favorite feature is Patchless Protection

"With Vicarius' vRx, I've never seen a patch that failed or had to be rolled back. We're saving quite a bit of time. Our clients using vRx haven't had any issues, and they've easily established patching for all their endpoints. "
Jeremy HermanJeremy Herman
Jeremy Herman
Security Engineer

Unified vulnerability discovery, prioritization, and remediation

"Vicarius streamlines vulnerability management between IT & Security by directly linking identified vulnerabilities to required patches, enhancing efficiency. The automation process has saved at least 30 percent of our manual tasks."
Wayne AjimineWayne Ajimine
Wayne Ajimine
Information Security Professional

Patchless Protection is an incredible technology!

"vRx reduces the time customers spend on patching by reducing the overhead on the administrators, allowing them to do additional work. It saves time they would spend addressing the patching process, follow-ups, etc."
Antwune GrayAntwune Gray
Antwune Gray
VP IT Security and Services

Merge Security & IT to Remediate Threats

“Vicarius’s vRx enabled Adama to centralize and consolidate work between IT and security teams, leading to a more efficient patching workflow."
Oshri CohenOshri Cohen
Oshri Cohen
CISO
Tanya Alfonso
4.8

Automated Patching, Scripting, and more

Talk with our team to get a personal walkthrough
Book a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.