CVE-2025-58364

6.5 MEDIUM

📋 TL;DR

CVE-2025-58364 is a remote denial-of-service vulnerability in OpenPrinting CUPS affecting versions 2.4.12 and earlier. It allows attackers on the local network to crash CUPS and cups-browsed services through unsafe deserialization, causing null pointer dereference. All Linux and Unix-like systems with default CUPS configurations listening for network printers are vulnerable.

💻 Affected Systems

Products:
  • OpenPrinting CUPS
  • cups-browsed
Versions: 2.4.12 and earlier
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: All systems with CUPS listening for network printers (default configuration). Risk extends to internet-facing systems only if CVE-2024-47176 is unpatched and firewall allows IPP traffic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete printing service disruption across all affected machines in a network, potentially affecting business operations that rely on printing services.

🟠

Likely Case

Temporary denial of printing services on affected systems until services are restarted, with potential for repeated attacks causing sustained disruption.

🟢

If Mitigated

Limited to local network impact with proper firewall rules, or no impact if patched or services are not network-accessible.

🌐 Internet-Facing: LOW (Only if CVE-2024-47176 is unpatched AND firewall allows IPP traffic AND system is internet-facing - rare combination)
🏢 Internal Only: HIGH (Default configuration allows adjacent network attacks, affecting all CUPS instances on local network)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Attack requires network access to CUPS IPP port (631 by default). Exploitation involves crafting malicious printer attribute data to trigger null dereference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.13

Vendor Advisory: https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4

Restart Required: No

Instructions:

1. Update CUPS to version 2.4.13 or later using your distribution's package manager. 2. For Debian/Ubuntu: sudo apt update && sudo apt upgrade cups. 3. For RHEL/CentOS/Fedora: sudo yum update cups or sudo dnf update cups. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Firewall IPP Port Blocking

Linux

Block incoming IPP (port 631) traffic from untrusted networks to prevent remote exploitation

sudo iptables -A INPUT -p tcp --dport 631 -j DROP
sudo iptables -A INPUT -p udp --dport 631 -j DROP

Disable Network Printer Discovery

Linux

Configure CUPS to not listen for network printers, limiting attack surface to localhost only

sudo cupsctl --no-remote-any
sudo systemctl restart cups

🧯 If You Can't Patch

  • Implement strict firewall rules to block IPP port 631 from all untrusted networks
  • Disable CUPS network listening entirely if network printing is not required

🔍 How to Verify

Check if Vulnerable:

Check CUPS version: cups-config --version or dpkg -l cups | grep ^ii

Check Version:

cups-config --version || dpkg -l cups 2>/dev/null | grep ^ii | awk '{print $3}' || rpm -q cups

Verify Fix Applied:

Verify version is 2.4.13 or higher: cups-config --version | grep -q '^2\.4\.1[3-9]\|^2\.4\.2\|^2\.[5-9]' && echo 'Patched'

📡 Detection & Monitoring

Log Indicators:

  • CUPS service crashes in system logs
  • Repeated connection attempts to port 631 followed by service failure
  • Error messages containing 'null pointer' or 'segmentation fault' in CUPS logs

Network Indicators:

  • Unusual traffic patterns to port 631/TCP
  • Multiple connection attempts to CUPS service from single source
  • Malformed IPP packets targeting printer attributes

SIEM Query:

source="cups" AND ("segmentation fault" OR "null pointer" OR "crashed" OR "terminated")

🔗 References

📤 Share & Export