{"id":"CVE-2024-47176","summary":"cups-browsed binds to `INADDR_ANY:631`, trusting any packet from any source","details":"CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.","modified":"2026-04-19T03:46:21.865622Z","published":"2024-09-26T21:13:05.913Z","related":["GHSA-7xfx-47qg-grp6","GHSA-p9rh-jxmq-gq47","GHSA-rj88-6mr5-rcw8","GHSA-w63j-6g73-wmg5","SUSE-SU-2024:3523-1","SUSE-SU-2024:3570-1","SUSE-SU-2024:3711-1","USN-7042-3","openSUSE-SU-2025:15563-1"],"database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47176.json","cwe_ids":["CWE-1327"]},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/09/27/6"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/09/11/2"},{"type":"WEB","url":"https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00048.html"},{"type":"WEB","url":"https://www.cups.org"},{"type":"WEB","url":"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47176.json"},{"type":"ADVISORY","url":"https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8"},{"type":"ADVISORY","url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47"},{"type":"ADVISORY","url":"https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5"},{"type":"ADVISORY","url":"https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47176"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20241011-0001/"},{"type":"FIX","url":"https://github.com/OpenPrinting/cups-browsed/commit/1debe6b140c37e0aa928559add4abcc95ce54aa2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openprinting/cups-browsed","events":[{"introduced":"0"},{"fixed":"1debe6b140c37e0aa928559add4abcc95ce54aa2"}]}],"versions":["2.0.0","2.0.1","2.0b1","2.0b2","2.0b3","2.0b4","2.0rc1","2.0rc2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47176.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}