CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177: Everything you need to know

Detect and mitigate CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177 vulnerabilities impacting CUPS and IPP packages.

2 분 읽기

The security researcher Simone Margaritelli (evilsocket), disclosed details of several vulnerabilities impacting CUPS and IPP packages: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177. These vulnerabilities are unlikely to be exploited in most cloud environments due to their requirements for exposing UDP port 631 and needing the victim to attempt a print request as part of the currently disclosed exploitation method. 

The vulnerabilities received CVSS base scores ranging from 8.0 to 9.0. It is recommended to mitigate these vulnerabilities and apply patches. 

What are these vulnerabilities? 

A remote, unauthenticated attacker can replace existing printers with a malicious one or add a new printer under their control, leading to arbitrary command execution when a print job is initiated from the affected system. The attack begins by sending a UDP packet to port 631, or in local LANs, attackers may spoof DNS advertisements. On vulnerable systems, the attacker can exploit this to replace or install a printer configuration on the victim's system that points to the attacker’s system. As part of the print service, an installed printer has the ability to execute arbitrary commands on the requesting system when a print request is made to it. In the most common scenarios the commands are run by the `lp` user, which is unprivileged.  

Wiz Research data: what’s the risk to cloud environments?       

According to Wiz data, 83% of cloud environments have at least one instance of the affected packages in the vulnerable version ranges. However, considering the current known exploitation method, we estimate that cloud environments are highly unlikely to be exploited remotely, since printing devices are rarely used in the cloud, and UDP port 631 is rarely open. 

What sort of exploitation has been identified in the wild?  

While no successful exploitation has been reported in the wild as of today, September 29, 2024, Wiz Threat Research has observed the following IPs attempting UDP communication through port 631, most likely scanning this port for malicious purposes or as part of security research -  

194.113.74[.]187 
195.228.75[.]121 
107.170.78[.]108 
107.170.72[.]202 
172.234.96[.]249 
192.34.63[.]88 
143.244.47[.]70 
104.152.52[.]220 

195.228.75[.]121, 143.244.47[.]70, 172.234.96[.]249 and 172.234.96[.]249 have also been observed by DataDog.  

Which products are affected? 

The following table lists the vulnerabilities and their impacted products: 

CVEPackageImpacted versions
CVE-2024-47176cups-browsedVersions up to and including 2.0.1
CVE-2024-47076libcupsfiltersVersions up to and including 2.1b1
CVE-2024-47175libppdVersions up to and including 2.1b1
CVE-2024-47177cups-filtersVersions up to and including 2.0.1

Which actions should security teams take? 

Few vendors released patches, it is also possible to apply these mitigations: 

  • Avoid exposing UDP port 631 and stop/disable cups-browsed

  • If CUPS support is required, you can apply this mitigation

    • Edit /etc/cups/cups-browsed.conf

    • Search for the BrowseRemoteProtocols configuration option 

    • Set the option to dnssd (the default value is dnssd cups, remove cups

    • Restart cups-browsed using sudo systemctl restart cups-browsed 

Wiz customers can use the pre-built query and advisory in the Wiz Threat Center to search for vulnerable instances in their environment. 

References 

계속 읽기

맞춤형 데모 받기

맞춤형 데모 신청하기

“내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다.”
데이비드 에슬릭최고정보책임자(CISO)
“Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다.”
아담 플레처최고 보안 책임자(CSO)
“우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다.”
그렉 포니아토프스키위협 및 취약성 관리 책임자