Search This Blog
CyberDudeBivash – Daily Cybersecurity Threat Intel, CVE Reports, Malware Trends & AI-Driven Security Insights. Stay Secure, Stay Informed.
Latest Cybersecurity News
- Get link
- X
- Other Apps
CUPS Flaws Allow Remote DoS & Auth Bypass: CVE-2025-58364 & CVE-2025-58060 (Linux Printing Under Threat)
Introduction
The Common UNIX Printing System (CUPS) is ubiquitous in Linux / UNIX-like environments. It handles the printing stack: discovering printers, managing print jobs, serving IPP (Internet Printing Protocol) requests, etc. Because it's often installed by default, lightly protected, and exposed on local networks (sometimes even to internet), flaws in CUPS are especially dangerous.
Recently, two vulnerabilities were disclosed:
-
CVE-2025-58364: Remote Denial of Service (DoS) via Null Dereference in
libcups
, IPv4 printer discovery / attributes parsing. -
CVE-2025-58060: Authentication Bypass in Authorization Handling when
AuthType
settings are non-Basic, allowing attackers to sendAuthorization: Basic
header and bypass password checks.
These affect many Linux distributions (RHEL, Oracle Linux, etc.), multiple versions of CUPS and cups-browsed
. Administrators must act fast.
Technical Details
CVE-2025-58364: Remote DoS via Null Pointer Dereference
-
Affected component:
libcups
library within CUPS, particularly the functionsipp_read_io()
→ippValidateAttributes()
. Unsafe deserialization of printer attributes and validation logic… leads to null pointer dereference. NVD+2Daily CyberSecurity+2 -
Attack vector: An attacker on the same local subnet crafting a printer response (using printer attributes) that causes the null pointer deref on client machines (listening for printers). On misconfigured hosts (exposed IPP ports, no firewall), possibly from remote/network. NVD+2Daily CyberSecurity+2
-
Impact: Crash of
cups
/cups-browsed
process → printing services down on affected machines; denial of service for print operations. Disruption for desktops and servers that rely on CUPS. NVD+1 -
Severity: CVSS v3.x ≈ 6.5 (Medium). NVD+1
-
Patch Versions: Fixed in CUPS version 2.4.13 (and later). Systems at <= 2.4.12 are vulnerable. NVD+2Oracle Linux+2
CVE-2025-58060: Authentication Bypass via Misconfigured AuthType
-
Affected component: CUPS authorization function (
cupsdAuthorize()
or equivalent) when AuthType ≠ Basic is configured. If a request includes anAuthorization: Basic ...
header, the password check can be skipped. NVD+2Rapid7+2 -
Attack vector: Local network (or remote if IPP is exposed); attacker crafts request with Basic auth header under non-Basic AuthType setting. The bug is logic in authorization handling. No credentials needed in practice under certain config. NVD+2Rapid7+2
-
Impact: Unauthorized access to administrative functions of CUPS: printer queue creation, management, possibly queue deletion or job manipulation. Could escalate to configuration changes, potential path to higher privilege if misused. Rapid7+1
-
Severity: CVSS v3.x ≈ 8.0 (High). NVD+1
-
Patch Versions: Fixed in versions >= 2.4.13. Systems with CUPS ≤ 2.4.12 vulnerable. NVD+1
Affected Environments & Exposure
-
Linux desktops and servers with CUPS installed, especially those listening for printers on the local network. Default configs often allow
cups-browsed
or printer discovery. NVD+1 -
Red Hat Enterprise Linux 9 and 10, Oracle Linux, other distros with older CUPS packages. (Red Hat advisory: RHSA-2025:15700 / RHSA-2025:15701.) Red Hat Customer Portal+1
-
Systems where IPP port is exposed (by firewall or misconfig), or where printer discovery replies come from adversarial sources on LAN. Internet-exposed printers worse case. NVD+1
Mitigation & Remediation Steps (CyberDudeBivash Guidance)
-
Upgrade CUPS & cups-browsed to version 2.4.13 or later — ensures both CVEs are patched. NVD+2Oracle Linux+2
-
Restrict printer discovery / browsing on local network — only trusted subnets; firewall rules to limit IPP traffic.
-
Review AuthType settings in CUPS configuration:
-
Avoid non-Basic AuthType when possible; fix logic if
AuthType
not Basic but Basic auth headers are accepted. -
Ensure
cupsd.conf
or equivalent denies unexpected Authorization headers under non-Basic modes.
-
-
Harden configuration files: ensure proper access control, disable remote configuration of printers from untrusted hosts.
-
Monitor logs for unexpected print job or admin endpoint access; monitor for crashes of
cups
orcups-browsed
processes (which may indicate DoS attempts). -
Apply vendor advisories: for Red Hat, Oracle, etc., use their errata RHSA/ELSA updates. Red Hat Customer Portal+1
-
Test / audit your systems (scan with Nessus / Qualys etc.) to detect versions before patch. Tenable®+1
Policy, Security & Broader Implications
-
Such flaws in printing systems are often overlooked in enterprise vulnerability programs; but they’re part of attack surface (especially in offices, universities, governments).
-
Default network services listening or discovery protocols are a recurring theme in vulnerabilities. The risk model must include local network threat actors, compromised devices on LAN.
-
Authentication bypasses are especially dangerous for regulation compliance (GDPR, etc.) if print jobs or admin config leaks.
-
Vendor disclosure and patch turnaround is relatively quick here, which is good; but checking for upstream library fixes (e.g. for libcups, cups filters) is necessary.
CUPS Flaws Alert
Header: CyberDudeBivash Threat Intel
Main Title: CUPS Flaws – Remote DoS & Auth Bypass (CVE-2025-58364 / CVE-2025-58060)
Highlights :
-
Null pointer deref → crash / DoS
-
Auth bypass when AuthType ≠ Basic
-
Version ≤ 2.4.12 vulnerable
-
Patch to ≥ 2.4.13 immediately
cyberdudebivash.com | cyberbivash.blogspot.com | cryptobivash.code.blog | cyberdudebivash-news.blogspot.com
Affiliate Blocks
-
[Enterprise CUPS Hardening Toolkit]
-
[Managed Printing Security Service]
-
[Linux Vulnerability Scanner / SIEM]
-
[Cybersecurity Training: Secure Linux Services]
#CyberDudeBivash #CUPS #CVE202558060 #CVE202558364 #RemoteDoS #AuthBypass #LinuxSecurity #OpenPrinting #PatchNow #VulnerabilityAlert
- Get link
- X
- Other Apps
Popular Posts
Exchange Hybrid Warning: CVE-2025-53786 can cascade into domain compromise (on-prem ↔ M365) By CyberDudeBivash — Cybersecurity & AI
- Get link
- X
- Other Apps
RAG Security: Threat Models, Attack Paths, and a Defense-in-Depth Blueprint By CyberDudeBivash — Founder, CyberDudeBivash | Cybersecurity & AI
- Get link
- X
- Other Apps
Comments
Post a Comment