this post was submitted on 27 Sep 2024
42 points (100.0% liked)

Linux

5232 readers
72 users here now

A community for everything relating to the linux operating system

Also check out [email protected]

Original icon base courtesy of [email protected] and The GIMP

founded 1 year ago
MODERATORS
 

cross-posted from: https://ani.social/post/6217644

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 4 points 1 month ago (7 children)

So CUPS has to be installed and port 631 exposed for this to be an issue?

[–] [email protected] 5 points 1 month ago (1 children)

CUPS is installed on the majority of desktop systems. One of the listed CVEs indicates that port 631 is by default open to the local network, so if you connect to any shared network (public WiFi, work/school network, even your home network if another compromised device gets connected to it) you're exposed. Or a browser flaw or other vulnerability could be exploited to forward a packet to that port.

In other words: While access to port 631 is required first, the severity of the vulnerability lies in how damn easy it is to take over a system after that. And the system can be re-compromised any time you print something, making this a persistent vector.

[–] [email protected] 2 points 1 month ago

Gotcha CUPS installed by default + no firewall by default = really not great.

load more comments (5 replies)