Systems that are potentially vulnerable must have all the following conditions:
- The
cups-browsed
package (version 2.0.1 or lower) must be installed - The
cups-browsed
service is started/enabled and listening on UDP port 631 - The server must be accessible to the attacker (either publicly facing internet or attacker has network access)
To exploit these chain of vulnerabilities, an attacker must trick a user into printing from a malicious printer server that has been created by the attacker.
Trend Micro Protection & Detection Against Exploitation
First and foremost, it is always recommended that users apply vendor-specific patches when they are available. As of the moment, official patches have not yet been released for all Linux variants - but systems that do not require printing capabilities can mitigate by either removing the cups-browsed
package or stopping and disabling the cups-browsed
service.
Trend Vision One™
Trend Micro has added Time-Critical Vulnerability alert in the Trend Vision One Executive Dashboard that will be continually updated with additional information related to prevention and detection as it becomes available.
In addition to the vendor patch(s) that should be applied, Trend Micro has released some detection rules and filters that may help provide additional protection and detection of malicious components associated with this vulnerability. Since a successful attack requires a chain of all of the related vulnerabilities, mitigating against parts of the chain can protect against the entire attack:
Trend Vision One - Endpoint Security, Deep Security & Vulnerability Protection IPS Rules
- 1012160 - CUPS Remote Code Execution Vulnerability (CVE-2024-47076)
Trend Cloud One - Network Security & TippingPoint Digital Vaccine (DV) Filters
- 44867 - IPP: CUPS Code Execution Vulnerability
Trend Micro Products/Services Potentially Affected
Below is the confirmed list of Trend Micro products that have been reviewed for potential impact. Products not listed may still be under investigation, and any additional information will be added here as necessary.
In our analysis, Trend Micro takes into account the entire scenario necessary to exploit a particular vulnerability in making a determination of whether or not a particular product may be vulnerable to a specific vulnerability. In this case, any flagging by a 3rd party vulnerability scanner on one of the mentioned products that are marked "Not Affected" should be treated as a False Positive.
Trend Micro Product/Service | Status |
---|---|
InterScan Messaging Security Virtual Appliance (IMSVA) |
Not Affected (Does not use impacted component) |