Demo of the CyCognito Platform

See the CyCognito platform in action to understand how it can help you identify, prioritize and eliminate your most critical risks. 

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024. 

The Total Economic Impact™ of The CyCognito Platform

Read The Total Economic Impact™ of The CyCognito Platform — a Forrester study. Cost Savings And Business Benefits Enabled By The CyCognito Platform. 

External Exposure & Attack Surface Management For Dummies

As your attack surface has grown to cloud infrastructures and across subsidiaries, attackers are looking for and finding unknown and unmanaged assets to serve as their entry points. 

 
GigaOm Radar for Attack Surface Management

The expansion of an organization's attack surface continues to present a critical business challenge. Download the GigaOm Radar for Attack Surface Management to get an overview of the available ASM solutions, identify leading offerings, and evaluate the best solution for you.  

Research

Emerging Security Issue: Multiple CUPS Vulnerabilities

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
October 16, 2024

What are CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177? 

On September 26, 2024, four critical vulnerabilities, CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177, were disclosed in the open-source printing system Common Unix Printing System (CUPS) and its components. Attackers can leverage the remote code execution (RCE) and input validation vulnerabilities as part of an attack chain. Once a fake printing device on a network-exposed system running CUPS is created, any print jobs processed on the fake devices can be used to remotely execute malicious code.

What assets are affected by these vulnerabilities?

The issues above affect four different CUPS components: 

  • CVE-2024-47176 affects cups-browsed version 2.0.1
  • CVE-2024-47076 affects libcupsfilters versions 2.1b1 and below
  • CVE-2024-47175 affects libbppd versions 2.1b1 and below
  • CVE-2024-47177 affects cups-filters versions 2.0.1 and below

These assets are primarily found on GNU/Linux systems. 

Are fixes available? 

Patches are not currently available for these issues. 

Are there any other actions to take? 

To mitigate potential exploitation, administrators can block UDP traffic on port 631. Alternatively, if CUPS is no longer in use, removed the cups-browsed service using the commands 

  • systemctl stop cups-browsed
  • systemctl disable cups-browsed 

Are these issues being actively exploited? 

As of October 14th, there are no reports of active exploitation of these vulnerabilities. 

How is CyCognito helping customers identify assets vulnerable to these issues? 

CyCognito is investigating active detection methods for these vulnerabilities. CyCognito users can check if any assets are running potentially vulnerable CUPS products using provided filters in the CyCognito platform. All customers have access to an in-platform emerging security issue announcement as of October 2nd, 2024.  

Figure 1: The alert sent by CyCognito for these issues.

How can CyCognito help your organization? 

CyCognito is an exposure management platform that reduces risk by discovering, testing and prioritizing security issues. The platform scans billions of websites, cloud applications and APIs and uses advanced AI to identify the most critical risks and guide remediation. Emerging companies, government agencies and Fortune 500 organizations rely on CyCognito to secure and protect from growing threats. Want to see how it works? Check out our website and explore our platform with a self-guided, interactive dashboard product tour. To learn how CyCognito can help you understand your external attack surface and exposed risks, please visit our Contact Us page to schedule a demo.




About the Author

Emma-Zaballos

Emma Zaballos

Product Marketing Manager

Emma Zaballos is an avid threat researcher who is passionate about understanding and combatting cybercrime threats. Emma enjoys monitoring dark web marketplaces, profiling ransomware gangs, and using intelligence for understanding cybercrime.

Topics



Search the Blog



Featured Posts








Top Tags



CyCognito Research Report

State of External Exposure Management, Summer 2024 Edition

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.

O'Reilly Report

Moving from Vulnerability Management to Exposure Management

Moving from Vulnerability Management to Exposure Management

Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.

Request a Free Scan

See Exactly What Attackers See

Get a Free Scan of Your Attack Surface

Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.

Related Guides

Discover insights on application security, exposure management and other key topics below.

Learning Center Attack Surface
Understanding Attack Surface Management

The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.

Learning Center Exposure Management
Exposure Management in Cybersecurity: Concepts and Technologies

Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.

Learning Center Vulnerability Assessment
Vulnerability Assessment: Process, Challenges & Best Practices

Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.

Related Products

Explore CyCognito modules ASM, AST and EI in the resources below.

Platform > Products
Attack Surface Management

Scalable, continuous, and comprehensive testing for all external assets, all the time.

Platform > Products
Automated Security Testing

CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.

Platform > Products
Exploit Intelligence

CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.