Loading...
Loading...
Browse all stories on DeepNewz
VisitWhat will be the primary method organizations use to mitigate the CUPS vulnerability by February 29, 2025?
Disabling CUPS • 25%
Applying a security patch • 25%
Network segmentation • 25%
Other • 25%
Surveys or reports from cybersecurity firms
CUPS Vulnerability Exposes 75,000 Systems to Remote Command Execution
Sep 26, 2024, 09:33 PM
A significant security vulnerability has been identified in the Common UNIX Printing System (CUPS), which could allow remote unauthenticated attackers to execute arbitrary commands on affected systems. The vulnerability involves the replacement of existing printers’ IPP URLs with malicious ones, leading to command execution when a print job is initiated. This issue affects numerous systems, including macOS, which runs CUPS by default. There are currently at least 75,000 exposed CUPS daemons on the internet. Experts recommend disabling or removing CUPS if printing is not required to mitigate the risk. Apple bought CUPS in 2007, and OpenPrinting forked it in 2020.
View original story
Ransomware • 25%
Data theft • 25%
Denial of Service • 25%
Other • 25%
Bypassing user consent • 25%
Terminal redirection • 25%
Gatekeeper bypass • 25%
Other method • 25%
Removal of Polyfill.io code • 33%
Switching to alternative services • 33%
Implementing additional security measures • 33%
Regulatory Changes • 25%
Sanctions • 25%
Public-Private Partnerships • 25%
Other • 25%
Phishing attacks • 25%
Direct server exploitation • 25%
Malware distribution • 25%
Other • 25%
Phishing • 25%
Direct network attack • 25%
Malware installation • 25%
Other • 25%
Phishing emails • 25%
Malware • 25%
Social engineering • 25%
Other • 25%
Rebooting up to 15 times • 25%
Software patch • 25%
Manual configuration changes • 25%
Other • 25%
Less than 50% • 25%
50% to 75% • 25%
76% to 90% • 25%
More than 90% • 25%
Updating RADIUS servers • 25%
Using TLS/IPSec • 25%
Avoiding PAP/CHAP methods • 25%
Other • 25%
Kernel Rootkit • 25%
SSDT Hook • 25%
Infinityhook • 25%
Other • 25%
Apple • 25%
Microsoft • 25%
Third-party cybersecurity firm • 25%
No patch released • 25%
Yes • 50%
No • 50%
No • 50%
Yes • 50%
No • 50%
Yes • 50%
Windows • 25%
macOS • 25%
Other • 25%
Linux • 25%