CVE-2024-47175
CVE-2024-47175 in CUPS libppd allows for potential code execution due to insufficient sanitization of IPP attributes. The ppdCreatePPDFromIPP2
function's failure to sanitize IPP attributes during PPD buffer creation, especially when combined with functions like cfGetPrinterAttributes5
, can lead to user-controlled input. While it has a CVSS score of 0, indicating minimal direct impact, SOCRadar's Vulnerability Risk Score (SVRS) of 40 suggests a moderate risk, indicating some exploitability. This vulnerability is significant as it can be a component in a more complex exploit chain, potentially leading to remote code execution (RCE) when combined with other vulnerabilities like CVE-2024-47176. The vulnerability is also tagged as In The Wild, which means it has been observed being exploited, and requires monitoring. Although not critical on its own, its role in enabling RCE makes it a priority for patching, especially in environments utilizing CUPS for printing services. Immediate investigation and application of relevant security patches are advised.
Description
CVE-2024-47175 is a vulnerability in CUPS, an open-source printing system. The vulnerability allows an attacker to execute arbitrary code on a vulnerable system by exploiting a flaw in the libppd
function ppdCreatePPDFromIPP2
. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.
Key Insights
- The SVRS for CVE-2024-47175 is 52, indicating a moderate level of severity.
- The vulnerability is actively exploited in the wild by unknown threat actors.
- The vulnerability can be exploited remotely, making it a high-risk threat.
- The vulnerability can lead to remote code execution, giving attackers complete control over the affected system.
Mitigation Strategies
- Update CUPS to the latest version.
- Disable the
libppd
module if it is not needed. - Restrict access to the affected system from untrusted networks.
- Implement a web application firewall (WAF) to block malicious requests.
Additional Information
- The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.
- If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.