CVE Vulnerabilities

CVE-2024-47176

Binding to an Unrestricted IP Address

Published: Sep 26, 2024 | Modified: Nov 04, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

CUPS is a standards-based, open-source printing system, and cups-browsed contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. cups-browsed binds to INADDR_ANY:631, causing it to trust any packet from any source, and can cause the Get-Printer-Attributes IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

Weakness

The product assigns the address 0.0.0.0 for a database server, a cloud service/instance, or any computing resource that communicates remotely.

Affected Software

NameVendorStart VersionEnd Version
Cups-browsedOpenprinting2.0.1 (including)2.0.1 (including)
Red Hat Enterprise Linux 7.7 Advanced Update SupportRedHatcups-filters-0:1.0.35-26.el7_7.3*
Red Hat Enterprise Linux 7 Extended Lifecycle SupportRedHatcups-filters-0:1.0.35-29.el7_9.3*
Red Hat Enterprise Linux 8RedHatcups-filters-0:1.20.0-35.el8_10*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatcups-filters-0:1.20.0-19.el8_2.2*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatcups-filters-0:1.20.0-24.el8_4.2*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatcups-filters-0:1.20.0-24.el8_4.2*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatcups-filters-0:1.20.0-24.el8_4.2*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatcups-filters-0:1.20.0-27.el8_6.3*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatcups-filters-0:1.20.0-27.el8_6.3*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatcups-filters-0:1.20.0-27.el8_6.3*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatcups-filters-0:1.20.0-29.el8_8.3*
Red Hat Enterprise Linux 9RedHatcups-filters-0:1.28.7-17.el9_4*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatcups-filters-0:1.28.7-10.el9_0.2*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatcups-filters-0:1.28.7-11.el9_2.2*
Cups-browsedUbuntudevel*
Cups-browsedUbuntunoble*
Cups-filtersUbuntuesm-infra/bionic*
Cups-filtersUbuntuesm-infra/focal*
Cups-filtersUbuntuesm-infra/xenial*
Cups-filtersUbuntufocal*
Cups-filtersUbuntujammy*

Extended Description

When a server binds to the address 0.0.0.0, it allows connections from every IP address on the local machine, effectively exposing the server to every possible network. This might be much broader access than intended by the developer or administrator, who might only be expecting the server to be reachable from a single interface/network.

Potential Mitigations

References