New Scanner Released to Detect CUPS RCE Vulnerability CVE-2024-47176

by | Oct 9, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

New Scanner Released to Detect CUPS RCE Vulnerability CVE-2024-47176

A new automated scanner has been developed to help security professionals detect devices vulnerable to the Common Unix Printing System (CUPS) Remote Code Execution (RCE) flaw, tracked as CVE-2024-47176. Discovered by Simone Margaritelli, this flaw allows attackers to execute arbitrary code remotely, albeit with some real-world constraints.

CUPS Flaw: A DDoS Amplification Threat

Although RCE exploitation in real-world scenarios is limited, Akamai demonstrated that CVE-2024-47176 can enable a 600x amplification factor in distributed denial-of-service (DDoS) attacks, raising further security concerns.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Marcus Hitchins Releases Python-Based Scanner

Cybersecurity researcher Marcus Hitchins (aka MalwareTech) developed the cups_scanner.py tool to allow system administrators to scan networks for vulnerable CUPS-Browsed services. The tool helps detect instances of CUPS-Browsed bound to UDP port 631, which can expose devices to unauthorized access or exploitation.

How the Scanner Works

The scanner sends custom UDP packets to broadcast addresses on port 631. Vulnerable CUPS instances respond by sending HTTP requests back to the scanner’s server. The results are logged, allowing administrators to identify and target affected devices for patching or reconfiguration.

Example scan and resultsExample scan and results
Source: GitHub




Logs and Next Steps

The tool creates two logs: cups.log, detailing the IP addresses and CUPS versions of responding devices, and requests.log, capturing the raw HTTP requests for further analysis. By using this tool, system administrators can mitigate exposure to CVE-2024-47176, improving network security.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This