{"vulnerability": "CVE-2024-47176", "sightings": [{"uuid": "5b1dc723-1327-47f0-b815-172115937135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://infosec.exchange/@adulau/113207584606763918", "content": "", "creation_timestamp": "2024-09-27T04:17:33.000000Z"}, {"uuid": "6fe1a1d5-7491-477b-9a5b-15f129b44c86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:04.000000Z"}, {"uuid": "2efb7836-7278-4502-976e-6380041edbcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "2286885a-c619-4d37-a1d7-187acfb34853", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:03.000000Z"}, {"uuid": "f7c6a525-ffa8-4a97-b8eb-eb1452914a4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://gist.github.com/Darkcrai86/10e2a9b182784760a5a157eea1f1001d", "content": "", "creation_timestamp": "2025-09-11T18:20:52.000000Z"}, {"uuid": "ed0d773f-1146-4050-bca4-80f6295544f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/misc/cups_browsed_info_disclosure.rb", "content": "", "creation_timestamp": "2024-10-02T19:05:07.000000Z"}, {"uuid": "bb63288f-c988-4742-98ac-4b2bea5c9ee4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "Telegram/lt5SkCQY6NzFttgTqheKTtx7TlAn90m-tSSHeRo10pnEExI", "content": "", "creation_timestamp": "2024-10-04T03:19:46.000000Z"}, {"uuid": "6b215485-3750-42f3-b7b6-ab7f4b529ee0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/cups_ipp_remote_code_execution.rb", "content": "", "creation_timestamp": "2024-11-22T14:28:34.000000Z"}, {"uuid": "02b91129-d503-4afa-a3f1-4eab122db5f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/3eaf0fde-67ad-4326-a84a-2e4ff201a8e9", "content": "", "creation_timestamp": "2024-09-27T04:15:35.899736Z"}, {"uuid": "cccfefe0-e70a-443d-9a27-a66e82b1d2d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/19c15eba-7fb7-4f1e-8fdd-f5871d05e797", "content": "", "creation_timestamp": "2024-09-30T07:31:43.981846Z"}, {"uuid": "f3e97f49-4f4e-406d-9c6f-1e4da7f2ee41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/81760", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #RCE #Remote\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2024-47176\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a deancooreman\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Shell\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-04-26 20:56:57\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nAutomated VirtualBox lab environment to exploit CVE-2024-47176 \u2014 an unauthenticated RCE vulnerability in CUPS \u2014 using a custom Python exploit and Kali Linux.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-04-26T21:00:39.000000Z"}, {"uuid": "271ab7f8-3cff-44fe-9781-5cbf9561bdd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8611", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPOC scanner for CVE-2024-47176\nURL\uff1ahttps://github.com/GO0dspeed/spill\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-27T01:33:24.000000Z"}, {"uuid": "c7e6197b-e791-44ba-a8c0-9b54f6a662fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://t.me/BleepingComputer/20826", "content": "\u200aNew scanner finds Linux, UNIX servers exposed to CUPS RCE attacks\n\nAn automated scanner has been released to help security professionals scan environments for devices vulnerable to the Common Unix Printing System (CUPS) RCE flaw tracked as CVE-2024-47176. [...]\n\nhttps://www.bleepingcomputer.com/news/software/new-scanner-finds-linux-unix-servers-exposed-to-cups-rce-attacks/", "creation_timestamp": "2024-10-09T22:19:35.000000Z"}, {"uuid": "674fc5e2-6024-4700-ac34-46d407e389f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8622", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aScanner for the CUPS vulnerability CVE-2024-47176\nURL\uff1ahttps://github.com/tonyarris/CVE-2024-47176-Scanner\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-27T20:12:52.000000Z"}, {"uuid": "baa5944c-8922-401a-a1d6-8b09e65ea1bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13696", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 The CUPS POC analysis\nCVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177.\n\nhttps://www.elastic.co/security-labs/cups-overflow", "creation_timestamp": "2024-09-29T07:13:53.000000Z"}, {"uuid": "21a0a565-2f7a-4a53-a4de-13808f73e562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8667", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aUnauthenticated RCE on cups-browsed (exploit)\nURL\uff1ahttps://github.com/l0n3m4n/CVE-2024-47176\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-03T15:58:50.000000Z"}, {"uuid": "b81626a1-e538-42a1-a7bd-496bcdbedbae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8645", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aUltrafast CUPS-browsed scanner (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177)\nURL\uff1ahttps://github.com/lkarlslund/jugular\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-30T07:22:12.000000Z"}, {"uuid": "bb63b6fd-ba80-4f81-b178-ffdd883376bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8619", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCUPS Browsd Check_CVE-2024-47176\nURL\uff1ahttps://github.com/workabhiwin09/CVE-2024-47176\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-27T18:27:15.000000Z"}, {"uuid": "8a210de9-2a4d-460f-92ee-7d8a0becf488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8629", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aVulnerability Scanner for CUPS: CVE-2024-47176\nURL\uff1ahttps://github.com/aytackalinci/CVE-2024-47176\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-28T19:05:33.000000Z"}, {"uuid": "20f74e81-6a5e-470e-931a-55886b206217", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8640", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA simple CVE-2024-47176 (cups_browsed) check tool written in go. \nURL\uff1ahttps://github.com/nma-io/CVE-2024-47176\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-29T17:55:20.000000Z"}, {"uuid": "5fb1e356-e8bf-496d-910f-f55dfdf864fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://t.me/itsec_news/4777", "content": "\u200b\u26a1\ufe0f\u041f\u0435\u0447\u0430\u0442\u044c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0432 Linux \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0437\u0430\u0445\u0432\u0430\u0442\u0443 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0430\n\n\ud83d\udcac \u041d\u0430 \u0434\u043d\u044f\u0445 \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Unix-\u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043f\u0435\u0447\u0430\u0442\u0438 CUPS, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0430\u044f \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e Linux-\u0441\u0438\u0441\u0442\u0435\u043c \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0430 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0437\u0430\u0445\u0432\u0430\u0442\u0443 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0430 \u0447\u0435\u0440\u0435\u0437 \u0441\u0435\u0442\u044c \u0438\u043b\u0438 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u043f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u0437\u0430\u0434\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u0435\u0447\u0430\u0442\u044c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0443\u0441\u0443\u0433\u0443\u0431\u043b\u044f\u0435\u0442 \u0442\u043e, \u0447\u0442\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043f\u043e\u043a\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0421\u0438\u043c\u043e\u043d\u0435 \u041c\u0430\u0440\u0433\u0430\u0440\u0438\u0442\u0435\u043b\u043b\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0439 \u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u0432\u0448\u0438\u0439 \u043e\u0431 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b \u0438\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u043e\u0432 Linux, \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 BSD, \u0430 \u0442\u0430\u043a\u0436\u0435, \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e, ChromeOS \u0438 Solaris. \u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u0433\u0440\u043e\u0437\u0430 \u0438\u0441\u0445\u043e\u0434\u0438\u0442 \u043e\u0442 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 cups-browsed, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0434\u043b\u044f \u0437\u0430\u0445\u0432\u0430\u0442\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043f\u0440\u0438 \u0441\u0442\u0430\u0440\u0442\u0435 \u0437\u0430\u0434\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u0435\u0447\u0430\u0442\u044c.\n\n\u0414\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u0438\u043c\u0435\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0435\u0440\u0432\u0438\u0441\u0443 CUPS \u043d\u0430 \u043f\u043e\u0440\u0442\u0435 631 \u0438 \u0434\u043e\u0436\u0434\u0430\u0442\u044c\u0441\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0437\u0430\u0434\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u0435\u0447\u0430\u0442\u044c \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435. \u0412 \u0441\u043b\u0443\u0447\u0430\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u0438 \u044d\u0442\u043e\u0433\u043e \u043f\u043e\u0440\u0442\u0430, \u0432\u043e\u0437\u043c\u043e\u0436\u0435\u043d \u0432\u0430\u0440\u0438\u0430\u043d\u0442 \u043f\u043e\u0434\u043c\u0435\u043d\u044b zeroconf, mDNS \u0438\u043b\u0438 DNS-SD \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438.\n\n\u0412\u0441\u0435\u0433\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0431\u044b\u043b\u043e \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043e \u0447\u0435\u0442\u044b\u0440\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:\n\nCVE-2024-47176 (cups-browsed \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.0.1): \u043d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a UDP-\u043f\u043e\u0440\u0442\u0443 631.\n\nCVE-2024-47076 (libcupsfilters \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.1b1): \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0430\u0442\u0440\u0438\u0431\u0443\u0442\u043e\u0432 \u043f\u0440\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438 IPP-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432.\n\nCVE-2024-47175 (libppd): \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0430\u0442\u0440\u0438\u0431\u0443\u0442\u043e\u0432 \u043f\u0440\u0438 \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 PPD-\u0444\u0430\u0439\u043b.\n\nCVE-2024-47177 (cups-filters \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.0.1): \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434 \u0438\u0437 \u0434\u0430\u043d\u043d\u044b\u0445 PPD-\u0444\u0430\u0439\u043b\u0430.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043d\u0430\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 \u043d\u0430 \u043f\u043e\u0440\u0442 631, \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u0443\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c\u0441\u044f \u043a \u0441\u0435\u0440\u0432\u0435\u0440\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430, \u043f\u0435\u0440\u0435\u0434\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435, \u0438, \u043f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u043f\u0435\u0447\u0430\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0437\u043b\u043e\u0432\u0440\u0435\u0434\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\n\u0425\u043e\u0442\u044f \u0443\u0433\u0440\u043e\u0437\u0430 \u043a\u0430\u0436\u0435\u0442\u0441\u044f \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439, \u0434\u043b\u044f \u0435\u0451 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0434\u043e\u043b\u0436\u0435\u043d \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0437\u0430\u0434\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0435\u0447\u0430\u0442\u044c. \u041f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u041c\u0430\u0440\u0433\u0430\u0440\u0438\u0442\u0435\u043b\u043b\u0438, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u043d\u0435 \u0434\u043e\u0441\u0442\u0438\u0433\u0430\u0435\u0442 \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u043f\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f \u0432 9.9 \u0438\u0437 10 \u043f\u043e CVSS, \u043a\u0430\u043a \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u043e\u0441\u044c \u0440\u0430\u043d\u0435\u0435, \u043e\u0434\u043d\u0430\u043a\u043e \u0432\u0441\u0451 \u0435\u0449\u0451 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0443\u0433\u0440\u043e\u0437\u0443.\n\n\u041f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u043e\u0441\u043d\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 watchTowr \u0411\u0435\u043d\u0434\u0436\u0430\u043c\u0438\u043d\u0430 \u0425\u0430\u0440\u0440\u0438\u0441\u0430, \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u043b\u0438\u0448\u044c \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u043f\u0440\u043e\u0446\u0435\u043d\u0442 Linux-\u0441\u0438\u0441\u0442\u0435\u043c, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0438\u0437 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430. \u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043e\u043d \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u0447\u0442\u043e\u0431\u044b \u0438\u0437\u0431\u0435\u0436\u0430\u0442\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u043e\u0432 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u0421\u0430\u043c \u041c\u0430\u0440\u0433\u0430\u0440\u0438\u0442\u0435\u043b\u043b\u0438 \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u0435\u0442 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u044f\u0442\u044c \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0448\u0430\u0433\u0438 \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b:\n\n\u041e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u0438\u0442\u044c \u0441\u0435\u0440\u0432\u0438\u0441 cups-browsed;\n\u0411\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a UDP-\u043f\u043e\u0440\u0442\u0443 631 \u0438 DNS-SD;\n\u041e\u0431\u043d\u043e\u0432\u0438\u0442\u044c CUPS \u043f\u0440\u0438 \u0432\u044b\u043f\u0443\u0441\u043a\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439.\n\n\u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u043e, \u0447\u0442\u043e \u041c\u0430\u0440\u0433\u0430\u0440\u0438\u0442\u0435\u043b\u043b\u0438 \u0441\u0442\u043e\u043b\u043a\u043d\u0443\u043b\u0441\u044f \u0441 \u0440\u044f\u0434\u043e\u043c \u0442\u0440\u0443\u0434\u043d\u043e\u0441\u0442\u0435\u0439 \u043f\u0440\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0438 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 CUPS. \u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e\u0441\u0442\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0438 \u0442\u0430\u043a\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u043a\u0430\u043a Canonical \u0438 Red Hat, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 CUPS \u043d\u0435\u043e\u0445\u043e\u0442\u043d\u043e \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u043b\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0445 \u043e\u0448\u0438\u0431\u043a\u0430\u0445.\n\n\u041f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u041c\u0430\u0440\u0433\u0430\u0440\u0438\u0442\u0435\u043b\u043b\u0438, \u0432\u043c\u0435\u0441\u0442\u043e \u0431\u044b\u0441\u0442\u0440\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043e\u043d\u0438 \u043f\u0440\u0435\u0434\u043f\u043e\u0447\u043b\u0438 \u0441\u043f\u043e\u0440\u0438\u0442\u044c \u043e \u0442\u043e\u043c, \u0432\u043b\u0438\u044f\u044e\u0442 \u043b\u0438 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0437 \u043d\u0438\u0445 \u043d\u0430 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c, \u0438 \u043f\u0440\u043e\u044f\u0432\u043b\u044f\u043b\u0438 \u0441\u043d\u0438\u0441\u0445\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0435 \u043a \u0437\u0430\u043c\u0435\u0447\u0430\u043d\u0438\u044f\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f. \u041c\u0430\u0440\u0433\u0430\u0440\u0438\u0442\u0435\u043b\u043b\u0438 \u0441\u0447\u0438\u0442\u0430\u0435\u0442 \u044d\u0442\u0443 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044e \u043f\u0440\u0438\u043c\u0435\u0440\u043e\u043c \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u043d\u0435 \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0431\u0440\u0430\u0449\u0430\u0442\u044c\u0441\u044f \u0441 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438 \u043f\u043e\u0434\u0447\u0451\u0440\u043a\u0438\u0432\u0430\u0435\u0442 \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u043e\u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0431\u043e\u043b\u0435\u0435 20 \u043b\u0435\u0442 \u043d\u0430 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443.\n\n\u041f\u043e\u043a\u0430 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u044b\u0435 \u043f\u0430\u0442\u0447\u0438 \u043d\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u044b, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u043d\u044f\u0442\u044c \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u0435\u043c\u044b\u0435 \u043c\u0435\u0440\u044b \u0434\u043b\u044f \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0430\u0446\u0438\u0438 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-09-27T16:16:01.000000Z"}, {"uuid": "9f5a42e5-3f50-4cf3-8446-ef7c17be9f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8768", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS). \nURL\uff1ahttps://github.com/gianlu335/CUPS-CVE-2024-47176\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-17T18:24:59.000000Z"}, {"uuid": "98b99aa1-87f2-4654-95e1-460222b1c988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://t.me/purple_medved/301", "content": "UoWPrint\n\nValdikSS - \u043c\u043e\u0439 \u0445\u043e\u0440\u043e\u0448\u0438\u0439 \u0434\u0440\u0443\u0433, \u043b\u0435\u0433\u0435\u043d\u0434\u0430\u0440\u043d\u044b\u0439 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0438 \u0442\u0430\u043b\u0430\u043d\u0442\u043b\u0438\u0432\u044b\u0439 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0441\u043e\u0442\u043d\u0438 \u0442\u044b\u0441\u044f\u0447 \u043b\u044e\u0434\u0435\u0439, \u0441\u043e\u0437\u0434\u0430\u043b \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 \u043a\u0440\u0443\u0442\u043e\u0439 \u043f\u0440\u043e\u0435\u043a\u0442\ud83d\udd25 \n\nUoWPrint - \u044d\u0442\u043e \u0441\u0435\u0440\u0432\u0435\u0440 \u043f\u0435\u0447\u0430\u0442\u0438 \u0438 \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0441 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u043e\u0439 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043e\u0432 AirPrint \u0438 Mopria \u0447\u0435\u0440\u0435\u0437 Wi-Fi, \u043d\u0430 Orange Pi 3G-IoT-A. \u0423\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u0440\u0435\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u043b\u044e\u0431\u043e\u0439 \u0441\u0442\u0430\u0440\u044b\u0439 USB-\u043f\u0440\u0438\u043d\u0442\u0435\u0440 \u0432 \u043f\u0440\u0438\u043d\u0442\u0435\u0440/\u041c\u0424\u0423 \u0441 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u043e\u0439 Wi-Fi \u0438 \u043f\u0435\u0447\u0430\u0442\u0430\u0442\u044c \u0438 \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u0437 \u043b\u044e\u0431\u043e\u0439 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b (Windows, macOS, Linux, iOS \u0438 Android) \u0431\u0435\u0437 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u043e\u0432.\n\n\u0423 \u043c\u0435\u043d\u044f \u0435\u0441\u0442\u044c \u0441\u0442\u0430\u0440\u044b\u0439-\u0434\u043e\u0431\u0440\u044b\u0439 \u041c\u0424\u0423 HP LaserJet M1123 \u0438 \u044f \u043f\u043e\u043c\u043d\u044e \u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0438 \u0441\u0442\u0440\u0430\u0434\u0430\u043d\u0438\u0439 \u043c\u043d\u043e\u0433\u043e \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434 \u043f\u043e\u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043b\u043e\u0441\u044c \u0447\u0442\u043e\u0431\u044b \u0441\u043e\u0431\u0440\u0430\u0442\u044c \u0434\u043b\u044f \u043d\u0435\u0433\u043e \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u043f\u043e\u0434 ARMv7 \u043d\u0430 3-\u0435\u0439 \u043c\u0430\u043b\u0438\u043d\u043a\u0435 \u0438 \u0437\u0430\u0432\u0435\u0441\u0442\u0438 CUPS, \u0447\u0442\u043e\u0431\u044b \u043c\u043e\u0436\u043d\u043e \u0431\u044b\u043b\u043e \u043f\u0440\u043e\u0441\u0442\u043e \u043f\u0435\u0447\u0430\u0442\u0430\u0442\u044c, \u043e\u0431\u044b\u0447\u043d\u043e \u043e\u0447\u0435\u043d\u044c \u0437\u0430\u0434\u0443\u043c\u0447\u0438\u0432\u043e \u0438 \u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e\ud83d\ude48 \n\nUoWPrint \u0436\u0435 \u0438\u0434\u0435\u0430\u043b\u044c\u043d\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043f\u0440\u044f\u043c\u043e \u0438\u0437 \u043a\u043e\u0440\u043e\u0431\u043a\u0438, \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u043f\u0440\u0438\u043d\u0442\u0435\u0440 \u043f\u043e USB, \u043f\u043e\u0434\u043d\u044f\u0442\u044c \u0442\u043e\u0447\u043a\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438\u043b\u0438 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0438\u0442\u0441\u044f \u043a \u0434\u043e\u043c\u0430\u0448\u043d\u0435\u0439 \u0441\u0435\u0442\u0438 \u0432 \u0440\u0435\u0436\u0438\u043c\u0435 \u043a\u043b\u0438\u0435\u043d\u0442\u0430 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 (\u0434\u0430\u043b\u0435\u0435 \u043c\u043e\u0436\u043d\u043e \u043f\u0435\u0440\u0435\u043a\u043b\u044e\u0447\u0430\u0442\u044c \u0440\u0435\u0436\u0438\u043c\u044b \u043a\u043d\u043e\u043f\u043e\u043a\u043e\u0439 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435) \u0438 \u043d\u0430\u0441\u043b\u0430\u0436\u0434\u0430\u0442\u044c\u0441\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u0435\u0447\u0430\u0442\u0430\u0442\u044c \u0438 \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u0442\u044c.\n\n\u0421\u0442\u043e\u0438\u0442 \u043e\u0442\u043c\u0435\u0442\u0438\u0442\u044c, \u0447\u0442\u043e \u044d\u0442\u043e \u043d\u0435\u043a\u043e\u043c\u043c\u0435\u0440\u0447\u0435\u0441\u043a\u0438\u0439 \u043f\u0440\u043e\u0435\u043a\u0442 \u0434\u043b\u044f \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u043e\u0432 \u041f\u041e \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c\ud83d\ude4f\n\u0414\u0435\u0432\u0430\u0439\u0441 \u0437\u0430 2000 \u0440\u0443\u0431 (~25$) \u044d\u0442\u043e \u0441\u0442\u043e\u0438\u043c\u043e\u0441\u044c \u043e\u0434\u043d\u043e\u043f\u043b\u0430\u0442\u043d\u0438\u043a\u0430 Orange Pi 3G-IoT-A \u0441 \u0430\u043a\u0440\u0438\u043b\u043e\u0432\u044b\u043c \u043a\u043e\u0440\u043f\u0443\u0441\u043e\u043c \u0438 \u043f\u0440\u0435\u0434\u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u043c \u0441\u043e\u0444\u0442\u043e\u043c UoWPrint. \u0418\u0437 \u044d\u0442\u043e\u0439 \u0441\u0443\u043c\u043c\u044b \u0441 \u043a\u0430\u0436\u0434\u043e\u0433\u043e \u043f\u0440\u043e\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 - 2$ \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u043c \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c CUPS, 2$ - \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c SANE/AirSane, \u0430 \u0435\u0449\u0435 2$ \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0434\u043b\u044f \u0444\u0438\u043d\u0430\u043d\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u043b\u0443\u0447\u0448\u0435\u043d\u0438\u044f \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u043e\u0432 Canon CAPT (v2+). \n\u0410 \u0442\u0430\u043a \u0436\u0435 \u0441\u044e\u0434\u0430 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u044b \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438 \u0438 \u043f\u0430\u0442\u0447\u0438\ud83d\udc4d \u041d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u043d\u0435\u0434\u0430\u0432\u043d\u0438\u0435 \u0431\u0430\u0433\u0438 \u0432 CUPS (CVE-2024-47175, CVE-2024-47076, CVE-2024-47176), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0431\u044b\u043b\u0438 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u044b 26.09.24, \u043f\u043e\u0444\u0438\u043a\u0448\u0435\u043d\u044b \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438 v1.15 \u043e\u0442 04.10.24\n\nPS: \u041d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0432\u0441\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043f\u0440\u043e\u0434\u0430\u043d\u044b, \u0441\u043b\u0435\u0434\u0438\u0442\u0435 \u0437\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043d\u0430 printserver.ink", "creation_timestamp": "2024-10-14T07:02:16.000000Z"}, {"uuid": "0eb693f8-51a0-4bb4-b623-63fa3c748740", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15564", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47177\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE-2024-47176, this can lead to remote command execution.\n\nThis vulnerability has been disputed by a third party because `FoomaticRIPCommandLine` is functionality that is intended to execute administrator specified code.\n\ud83d\udccf Published: 2024-09-26T21:56:36.661Z\n\ud83d\udccf Modified: 2025-05-08T16:33:14.340Z\n\ud83d\udd17 References:\n1. https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47\n2. https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n3. https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5\n4. https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6\n5. https://bugzilla.suse.com/show_bug.cgi?id=1230931\n6. https://www.cups.org\n7. https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I", "creation_timestamp": "2025-05-08T17:24:19.000000Z"}, {"uuid": "5ff4c912-8b63-46c8-bf70-69b004971bb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/poxek/4433", "content": "Scan for CVE-2024-47176 (CUPS - Remote Code Execution) with Nuclei\n\nVulnerability discovery: https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/\nNuclei Template: https://cloud.projectdiscovery.io/?template=CVE-2024-47176\n\nSource: https://x.com/pdnuclei/status/1840195177098453308", "creation_timestamp": "2024-09-29T08:25:27.000000Z"}, {"uuid": "7f3d9360-a972-4c3a-b43b-44a7d017339e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/poxek/4431", "content": "\ud83d\udc27 Cupshax - RCE \u0447\u0435\u0440\u0435\u0437 \u0441\u043b\u0443\u0436\u0431\u0443 \u043f\u0435\u0447\u0430\u0442\u0438 \u0432 UNIX\n#unix #RCE #CVE\n\nCVE-2024-47176 CVE-2024-47076 CVE-2024-47175 CVE-2024-47177\n\n\u0412\u0447\u0435\u0440\u0430 \u0432\u0435\u0447\u0435\u0440\u043e\u043c \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u043d\u0430\u0432\u043e\u0434\u043d\u0438\u043b\u0441\u044f \u043d\u043e\u0432\u043e\u0441\u0442\u044c\u044e \u043e \u043d\u043e\u0432\u043e\u0439 \u0431\u0430\u0433\u0435 \u0432 UNIX \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 RCE. \u041d\u043e \u0431\u044b\u043b\u0438 \u043e\u0441\u043e\u0431\u044b\u0435 \u0443\u0441\u043b\u043e\u0432\u0438\u044f, \u043a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 \u0447\u0442\u043e \u0434\u043e\u043b\u0436\u043d\u0430 \u0431\u044b\u0442\u044c \u043e\u0447\u0435\u0440\u0435\u0434\u044c \u043d\u0430 \u043f\u0435\u0447\u0430\u0442\u044c. \u0412 \u043f\u0440\u0438\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u043d\u043e\u043c \u0432\u0438\u0434\u043e\u0441\u0435 \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u0435\u0442\u0441\u044f PoC.\n\n\ud83d\udee0 \u0418\u0437\u0443\u0447\u0438\u0442\u044c \u0440\u0430\u0439\u0442\u0430\u043f \u0422\u0423\u0422\n\n\u0410\u0432\u0442\u043e\u0440\u044b \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u0438\u0437\u0443\u0447\u0438\u043b\u0438 \u043a\u043e\u043c\u043c\u0438\u0442 \u0432 OpenPrinting CUPS, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0431\u0430\u0433\u0430 \u0438 \u043d\u0430\u043f\u0438\u0441\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442. \u041e\u043d \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 dns-sd \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u0430, \u0442\u0440\u0435\u0431\u0443\u044f, \u0447\u0442\u043e\u0431\u044b \u0446\u0435\u043b\u044c \u043c\u043e\u0433\u043b\u0430 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0448\u0438\u0440\u043e\u043a\u043e\u0432\u0435\u0449\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435, \u0442.\u0435. \u043d\u0430\u0445\u043e\u0434\u0438\u043b\u0430\u0441\u044c \u0432 \u0442\u043e\u0439 \u0436\u0435 \u0441\u0435\u0442\u0438.\n\n\u27a1\ufe0f\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\nusage: cupshax.py [-h] [--name NAME] --ip IP [--command COMMAND] [--port PORT]\n\nA script for executing commands remotely\n\noptions:\n  -h, --help         show this help message and exit\n  --name NAME        The name to use (default: RCE Printer)\n  --ip IP            The IP address of the machine running this script\n  --command COMMAND  The command to execute (default: 'touch /tmp/pwn')\n  --port PORT        The port to connect on (default: 8631)\n\n\u27a1\ufe0f\u041f\u0440\u0438\u043c\u0435\u0440 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f\npython cupshax.py --name \"Print to PDF (Color)\" \\\n                  --command \"id&gt;/tmp/pwn\" \\\n                  --ip 10.0.0.3\n\n\ud83d\udcf1 Github \u0438 \u043c\u043e\u0439 \u0444\u043e\u0440\u043a, \u043d\u0430 \u0441\u043b\u0443\u0447\u0430\u0439 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0440\u0435\u043f\u044b\n\n\ud83c\udf1a @poxek | \ud83d\udcfa RuTube | \ud83c\udf1a \u041c\u0435\u0440\u0447 \u041f\u043e\u0445\u0435\u043a", "creation_timestamp": "2024-09-27T10:55:39.000000Z"}, {"uuid": "0e6d498a-47ad-4f02-924a-bc1b6e89613d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/1491", "content": "#Threat_Research\n1. Watchguard Unauthenticated and Unencrypted SSO Protocol\nhttps://www.redteam-pentesting.de/en/advisories/rt-sa-2024-006\n2. Attacking UNIX Systems via CUPS (CVE-2024-47076, CVE-2024-47115, CVE-2024-47176, CVE-2024-47177)\nhttps://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I\n]-&gt; https://github.com/RickdeJager/cupshax", "creation_timestamp": "2024-09-27T19:48:09.000000Z"}, {"uuid": "4d0943e4-39dd-4058-8654-3182313eca56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "exploited", "source": "https://t.me/kasperskyb2b/1433", "content": "\ud83d\udda8 \u0421\u0442\u0440\u0430\u0445 \u0438 \u043d\u0435\u043d\u0430\u0432\u0438\u0441\u0442\u044c \u0432 \u041b\u0430\u0441-\u041b\u0438\u043d\u0443\u043a\u0441\u0435\n\n\u0421 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0438 \u0440\u0430\u0437\u0432\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u0434\u0440\u0430\u043c\u0430 \u0432\u043e\u043a\u0440\u0443\u0433 \u0441\u0435\u0440\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 CUPS, Common Unix Printing System. \u041a \u043e\u0436\u0438\u0434\u0430\u043d\u0438\u044f\u043c, \u0441\u0442\u0440\u0430\u0445\u0430\u043c \u0438 \u0440\u0430\u0437\u0431\u043e\u0440\u043a\u0430\u043c \u0434\u043e\u0431\u0430\u0432\u0438\u043b\u0438\u0441\u044c \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\n\u0415\u0441\u043b\u0438 \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u0438\u0442\u044c \u0434\u0435\u0444\u0435\u043a\u0442\u044b CVE-2024-47176, -47076, -47175, \u0438 -47177 \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0432 \u0442\u0435\u043e\u0440\u0438\u0438 \u043c\u043e\u0436\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 Linux-\u0441\u0438\u0441\u0442\u0435\u043c\u0435.  \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0430\u043d\u043e\u043d\u0441\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0444\u0430\u043b\u044c\u0448\u0438\u0432\u044b\u0439 \u043f\u0440\u0438\u043d\u0442\u0435\u0440, \u0438\u043d\u0434\u0435\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0435\u0433\u043e \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 CUPS \u0436\u0435\u0440\u0442\u0432\u044b \u0438 \u0441\u043d\u0430\u0431\u0434\u0438\u0442\u044c \u0444\u0430\u0439\u043b\u043e\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0435\u0439 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u0430, PPD, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434, \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0438\u0439, \u0435\u0441\u043b\u0438 \u043d\u0430 \u044d\u0442\u043e\u043c \u00ab\u043f\u0440\u0438\u043d\u0442\u0435\u0440\u0435\u00bb \u0447\u0442\u043e-\u0442\u043e \u043d\u0430\u043f\u0435\u0447\u0430\u0442\u0430\u0442\u044c. \u0412 \u044d\u0442\u043e\u043c \u0433\u043b\u0430\u0432\u043d\u0430\u044f \u0437\u0430\u0433\u0432\u043e\u0437\u0434\u043a\u0430 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u2014 \u043d\u0443\u0436\u043d\u043e \u0443\u0431\u0435\u0434\u0438\u0442\u044c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043d\u0430\u043f\u0435\u0447\u0430\u0442\u0430\u0442\u044c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442 \u043d\u0430 \u043d\u0435\u0437\u043d\u0430\u043a\u043e\u043c\u043e\u043c \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u0435. \u0414\u0435\u0444\u0435\u043a\u0442\u0443 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u0431\u043e\u0440\u043a\u0438 Linux.\n\n\u0414\u0440\u0430\u043c\u0430 \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u0442\u0435\u043c, \u0447\u0442\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c, \u043d\u0430\u0448\u0435\u0434\u0448\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0443\u0441\u0442\u0430\u043b \u043e\u0431\u0449\u0430\u0442\u044c\u0441\u044f \u0441 \u043c\u0435\u0439\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430\u043c\u0438 CUPS \u043f\u043e \u043f\u043e\u0432\u043e\u0434\u0443 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u043d\u0430\u043f\u0438\u0441\u0430\u043b \u043e \u043d\u0438\u0445 \u0434\u043e \u0432\u044b\u0445\u043e\u0434\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439. \u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u043d\u0435\u0442 \u0438 \u043d\u0430 \u0441\u0435\u0433\u043e\u0434\u043d\u044f\u0448\u043d\u0438\u0439 \u0434\u0435\u043d\u044c. \u041e\u0431\u0435\u0449\u0430\u043d\u0438\u044f \u00abRCE \u0441 CVSS 9.9\u00bb \u0431\u0435\u0437\u0443\u0441\u043b\u043e\u0432\u043d\u043e \u0432\u0437\u0431\u0443\u0434\u043e\u0440\u0430\u0436\u0438\u043b\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e, \u0438 \u043e \u0431\u0430\u0433\u0435 \u043d\u0430\u043f\u0438\u0441\u0430\u043b\u0438 \u0432\u0441\u0435 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 VM-\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u044f\u0432\u0438\u043b\u0438\u0441\u044c \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e PoC.\n\u041d\u043e \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u043f\u043e\u043b\u044c\u0437\u0430 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0432 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0430\u0445 \u043f\u043e\u0434 \u0432\u043e\u043f\u0440\u043e\u0441\u043e\u043c \u2014 \u043f\u0435\u0447\u0430\u0442\u044c \u0441 Linux-\u043c\u0430\u0448\u0438\u043d  \u043d\u0435 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043c\u0430\u0441\u0441\u043e\u0432\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u043c \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0435\u043c, \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u0439 \u043d\u0430 \u0432\u0445\u043e\u0434\u044f\u0449\u0438\u0435 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f \u043f\u043e\u0440\u0442 631 \u0435\u0441\u0442\u044c \u0442\u043e\u043b\u044c\u043a\u043e \u0443 \u0441\u0430\u043c\u044b\u0445 \u0431\u0435\u0441\u043f\u0435\u0447\u043d\u044b\u0445, \u0438, \u043e\u043f\u044f\u0442\u044c \u0436\u0435, \u0443\u0431\u0435\u0434\u0438\u0442\u044c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043d\u0430\u043f\u0435\u0447\u0430\u0442\u0430\u0442\u044c \u0447\u0442\u043e-\u0442\u043e \u043d\u0430 \u043d\u043e\u0432\u043e\u043c \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u0435 \u043d\u0435\u043b\u0435\u0433\u043a\u043e.\n\n\u041d\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0432\u0441\u0451 \u0436\u0435 \u043f\u044b\u0442\u0430\u044e\u0442\u0441\u044f: \u0443\u0436\u0435 \u0432 \u043d\u0430\u0447\u0430\u043b\u0435 \u043d\u0435\u0434\u0435\u043b\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0445\u043e\u0441\u0442\u043e\u0432 \u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0434\u0435\u0444\u0435\u043a\u0442\u0430. \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Akamai (\u043d\u0430 \u0438\u043b\u043b\u044e\u0441\u0442\u0440\u0430\u0446\u0438\u0438), \u0432 \u0441\u0435\u0442\u044c \u0441\u043c\u043e\u0442\u0440\u0438\u0442 \u043e\u043a\u043e\u043b\u043e 75 \u0442\u044b\u0441\u044f\u0447 \u0445\u043e\u0441\u0442\u043e\u0432 \u0441 CUPS, \u0430 \u0441\u0435\u0440\u0432\u0438\u0441\u044b \u043f\u0435\u0447\u0430\u0442\u0438 \u0432 \u0441\u0440\u0435\u0434\u043d\u0435\u043c \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u043d\u0430 10% Linux-\u0441\u0438\u0441\u0442\u0435\u043c. \u0412 \u0420\u0424 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e \u043e\u043a\u043e\u043b\u043e 5000 \u0445\u043e\u0441\u0442\u043e\u0432.   \n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u043f\u0430\u0442\u0447\u0435\u0439, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u043d\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c. \u0412 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u043b\u0443\u0447\u0430\u0435\u0432 \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0438 \u0434\u0435\u0438\u043d\u0441\u0442\u0430\u043b\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0435\u0440\u0432\u0438\u0441 cups-browsed, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043e\u043d \u043d\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0435. \n\u0422\u0430\u043a\u0436\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u043d\u043e \u0437\u0430\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0432\u0445\u043e\u0434\u044f\u0449\u0438\u0435 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f \u043d\u0430 \u043f\u043e\u0440\u0442 631.\n\n\u0414\u043b\u044f \u0442\u0435\u0445, \u043a\u043e\u043c\u0443 \u043d\u0443\u0436\u043d\u043e \u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0441\u0435\u0440\u0432\u0438\u0441 CUPS \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c, \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u0441\u043c\u044f\u0433\u0447\u0430\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b \u043e\u043f\u0438\u0441\u0430\u043d\u044b \u0432 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435 RedHat.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2024-10-01T08:24:43.000000Z"}, {"uuid": "48be4667-51b5-4f7b-a3e0-dba5d8b9abdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "Telegram/x_KGpvZo1FWYATjaZwHxv3n5_KpQVPPjqVTyMjO_dF0kjA", "content": "", "creation_timestamp": "2024-10-03T19:28:12.000000Z"}, {"uuid": "cf325690-8447-4aff-a6eb-9a9009b4c548", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "Telegram/wf6_1JKBCzuNNq3dQU6jatGAoF0f6DzPux9cbboZAdBa3Ds", "content": "", "creation_timestamp": "2024-10-09T00:48:15.000000Z"}, {"uuid": "552ad9eb-862d-458e-9760-73e0542ef1cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://t.me/ton618cyber/5323", "content": "New scanner finds Linux, UNIX servers exposed to CUPS RCE attacks\n\nAn automated scanner has been released to help security professionals scan environments for devices vulnerable to the Common Unix Printing System (CUPS) RCE flaw tracked as CVE-2024-47176.\n\nBill Toulas | bleepingcomputer.com \u2022 Oct 8, 2024", "creation_timestamp": "2024-10-09T00:58:35.000000Z"}, {"uuid": "8099ba9c-af52-4cb5-80aa-5abb592b6336", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://t.me/cvedetector/6465", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47176 - Vulnerability Title: CUPS cups-browsed Remote Code Execution Over Network (RCE)\", \n  \"Content\": \"CVE ID : CVE-2024-47176 \nPublished : Sept. 26, 2024, 10:15 p.m. | 18\u00a0minutes ago \nDescription : CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL.  \n  \nDue to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T00:42:06.000000Z"}, {"uuid": "bfd15121-a6db-4750-b4fa-eadb68df539f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://t.me/cvedetector/6464", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47175 - CUPS Libppd IPP Attribute Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47175 \nPublished : Sept. 26, 2024, 10:15 p.m. | 18\u00a0minutes ago \nDescription : CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T00:42:06.000000Z"}, {"uuid": "f2e2fc5b-58c6-460a-9565-c5244d42ef02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/4947", "content": "\ud83d\udca1CVE-2024-47176 Vulnerability Scanner (Cups-Browsed)\n\nhttps://darkwebinformer.com/cve-2024-47176-vulnerability-scanner-cups-browsed/", "creation_timestamp": "2024-10-08T23:55:05.000000Z"}, {"uuid": "583d1f00-4603-42b2-a6e3-f4abd0edaad6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://t.me/ton618cyber/1843", "content": "New scanner finds Linux, UNIX servers exposed to CUPS RCE attacks\n\nAn automated scanner has been released to help security professionals scan environments for devices vulnerable to the Common Unix Printing System (CUPS) RCE flaw tracked as CVE-2024-47176.\n\nBill Toulas | bleepingcomputer.com \u2022 Oct 8, 2024", "creation_timestamp": "2024-10-09T00:58:35.000000Z"}, {"uuid": "eb51e6cf-4239-4bd1-ae59-b61af73281d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/4721", "content": "#Threat_Research\n1. Watchguard Unauthenticated and Unencrypted SSO Protocol\nhttps://www.redteam-pentesting.de/en/advisories/rt-sa-2024-006\n2. Attacking UNIX Systems via CUPS (CVE-2024-47076, CVE-2024-47115, CVE-2024-47176, CVE-2024-47177)\nhttps://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I\n]-&gt; https://github.com/RickdeJager/cupshax", "creation_timestamp": "2024-09-27T19:48:09.000000Z"}, {"uuid": "7fe15303-ec16-4534-9b60-3095e1e2e871", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/2159", "content": "https://github.com/l0n3m4n/CVE-2024-47176\n\nUnauthenticated RCE on cups-browsed (exploit and nuclei template)\n#github #exploit", "creation_timestamp": "2024-10-03T19:26:01.000000Z"}, {"uuid": "fe3d0f6e-f56f-4a32-9967-17c4c8ddca6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/19177", "content": "https://github.com/l0n3m4n/CVE-2024-47176\n\nUnauthenticated RCE on cups-browsed (exploit and nuclei template)\n#github #exploit", "creation_timestamp": "2024-10-03T19:26:01.000000Z"}, {"uuid": "7a69ad42-75fc-4817-bca4-ed4137522c59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15425", "content": "\u200aResearcher Releases Open-Source Scanner for CVE-2024-47176 CUPS Vulnerability\n\nhttps://securityonline.info/researcher-releases-open-source-scanner-for-cve-2024-47176-cups-vulnerability/", "creation_timestamp": "2024-10-08T14:31:02.000000Z"}, {"uuid": "bd56c9e5-9c27-4c29-935f-1fb843ce52ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "Telegram/N1DtHFsyDu8hfvxEilITvr_MpXXai-04yAKGKsC4ri00ulA", "content": "", "creation_timestamp": "2024-09-27T17:08:06.000000Z"}, {"uuid": "ef07c574-1c48-4743-a6ab-1844c74d4906", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/dc_main/7090", "content": "CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, CVE-2024-47177: Linux OpenPrinting CUPS RCE\n\nPoC: https://github.com/RickdeJager/cupshax\n\npatch:\nsudo systemctl stop cups-browsed\nsudo systemctl disable cups-browsed\n\n#exploit #git #pentest #redteam", "creation_timestamp": "2024-10-08T17:36:48.000000Z"}, {"uuid": "b69de4d0-310e-4131-a5ec-5fd6c009c497", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/zer0day1ab/292", "content": "CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, CVE-2024-47177: Linux OpenPrinting CUPS RCE\n\nPoC: https://github.com/RickdeJager/cupshax\n\npatch:\nsudo systemctl stop cups-browsed\nsudo systemctl disable cups-browsed\n\n#exploit #git #pentest #redteam", "creation_timestamp": "2024-10-08T11:44:31.000000Z"}, {"uuid": "7ea9f1db-e976-4bdd-bdc8-5c77ccd29ee6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6260", "content": "\u041a\u0438\u0431\u0435\u0440\u043f\u043e\u0434\u043f\u043e\u043b\u044c\u0435 \u043d\u0430\u0446\u0435\u043b\u0438\u043b\u043e\u0441\u044c \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 \u043f\u0435\u0447\u0430\u0442\u0438 CUPS, \u043c\u0430\u0441\u0441\u043e\u0432\u043e \u0441\u043a\u0430\u043d\u0438\u0440\u0443\u044f \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u0432 \u043d\u0435\u043c \u0441\u0438\u0441\u0442\u0435\u043c UNIX \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044b\u043c\u0438 \u043f\u043e\u0440\u0442\u0430\u043c\u0438 \u043f\u0435\u0447\u0430\u0442\u0438.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0421\u0438\u043c\u043e\u043d\u0435 \u041c\u0430\u0440\u0433\u0430\u0440\u0438\u0442\u0435\u043b\u043b\u0438 \u0435\u0449\u0435 \u0432 \u043d\u0430\u0447\u0430\u043b\u0435 \u044d\u0442\u043e\u0433\u043e \u0433\u043e\u0434\u0430 \u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044b \u0432 \u043a\u043e\u043d\u0446\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0438.\n\n\u041e\u043d\u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-47176, CVE-2024-47076, CVE-2024-47175 \u0438 CVE-2024-47177.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 CUPS, \u043e\u0431\u0449\u0443\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043f\u0435\u0447\u0430\u0442\u0438 UNIX, \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c UNIX \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u043f\u0435\u0447\u0430\u0442\u0438.\n\n\u0412\u0441\u0435 \u043e\u043d\u0438 \u0432\u044b\u0441\u0442\u0443\u043f\u0430\u044e\u0442 \u0447\u0430\u0441\u0442\u044c\u044e \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043f\u0440\u0438\u043d\u0442\u0435\u0440, \u0438\u043d\u0434\u0435\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u0440\u0438\u043d\u0442\u0435\u0440 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 CUPS \u0436\u0435\u0440\u0442\u0432\u044b, \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u0432\u043d\u0443\u0442\u0440\u0438 \u0444\u0430\u0439\u043b\u0430 PPD \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0435\u0433\u043e \u0438\u0437 \u0444\u0430\u0439\u043b\u0430 PPD, \u043a\u043e\u0433\u0434\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u0437\u0430\u0434\u0430\u043d\u0438\u0435 \u043f\u0435\u0447\u0430\u0442\u0438 \u0447\u0435\u0440\u0435\u0437 (\u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439) \u043f\u0440\u0438\u043d\u0442\u0435\u0440 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430.\n\n\u041a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0430\u0448\u043b\u0438 \u043e\u0442\u0440\u0430\u0436\u0435\u043d\u0438\u0435 \u0432 \u043e\u0442\u0447\u0435\u0442\u0430\u0445 Akamai, Rapid7, Elastic, Tenable, Qualys, DataDog \u0438 AquaSec, \u043d\u043e \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u043b\u0438 \u043f\u0440\u0438\u0441\u0442\u0430\u043b\u044c\u043d\u043e\u0435 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 \u041c\u0430\u0440\u0433\u0430\u0440\u0438\u0442\u0435\u043b\u043b\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u0432 X \u0434\u043e \u0432\u044b\u043f\u0443\u0441\u043a\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439.\n\n\u041d\u043e \u043d\u0435 \u0442\u0430\u043a \u0432\u0441\u0435 \u043f\u043b\u043e\u0445\u043e, \u0432\u0435\u0434\u044c \u043e\u0448\u0438\u0431\u043a\u0430\u043c \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u043d\u0435 \u0432\u0441\u0435 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u044b Linux (\u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435), \u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u0445 \u043c\u043e\u0436\u043d\u043e \u043b\u0438\u0448\u044c \u0432 \u043e\u0447\u0435\u043d\u044c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u0445 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u044f\u0445, \u0442\u0430\u043a \u0447\u0442\u043e \u0441\u0442\u0435\u043f\u0435\u043d\u044c \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0441\u0442\u0438 (CVSS 9,9), \u043f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u043c\u043d\u043e\u0433\u0438\u0445 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0437\u0430\u0432\u044b\u0448\u0435\u043d\u0430.\n\n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043f\u043e\u043c\u0438\u043c\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439, \u0432 \u043a\u043e\u043d\u0446\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0438 \u041c\u0430\u0440\u0433\u0430\u0440\u0438\u0442\u0435\u043b\u043b\u0438 \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 PoC, \u0447\u0442\u043e \u0438 \u0432\u044b\u0437\u0432\u0430\u043b\u043e \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u043f\u043e\u0438\u0441\u043a\u0430 UDP-\u043f\u043e\u0440\u0442\u0430 631, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440 CUPS \u043f\u0440\u043e\u0441\u043b\u0443\u0448\u0438\u0432\u0430\u0435\u0442 \u043d\u043e\u0432\u044b\u0435 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u044b, \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0449\u0438\u0435 \u043e \u0441\u0432\u043e\u0435\u043c \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0438.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e CUPS \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0432 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u043e\u0432, \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c\u00a0Shodan, \u0432 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0431\u043e\u043b\u0435\u0435 75\u00a0000 \u0441\u0438\u0441\u0442\u0435\u043c, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0438\u0445 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c CUPS, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0447\u0435\u0440\u0435\u0437 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u0431\u043e\u043b\u0435\u0435 107\u00a0000, \u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438 \u0431\u043e\u043b\u044c\u0448\u0435.\n\n\u0421\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u043f\u0440\u043e\u0441\u0442\u043e\u0435. \u041f\u0440\u043e\u0441\u0442\u043e \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c, \u0443\u0434\u0430\u043b\u0438\u0442\u044c \u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c CUPS. \n\n\u041d\u043e \u0432 \u043b\u044e\u0431\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u0431\u0435\u0437 \u044d\u0442\u043e\u0433\u043e \u043d\u0435 \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0435\u0433\u043e \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c.", "creation_timestamp": "2024-09-30T13:11:39.000000Z"}, {"uuid": "b4e0edc5-0baf-455f-9f77-e01500be452a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1539", "content": "CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, CVE-2024-47177: Linux OpenPrinting CUPS RCE\n\nblog: https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/\n\nPoC: https://github.com/RickdeJager/cupshax\n\npatch:\nsudo systemctl stop cups-browsed\nsudo systemctl disable cups-browsed\n\n#exploit #git #pentest #redteam", "creation_timestamp": "2024-09-27T12:56:55.000000Z"}, {"uuid": "2cf249f9-7187-467d-a6c3-13626fcd5c1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "seen", "source": "https://t.me/thehackernews/5652", "content": "\ud83d\udea8 New CUPS vulnerabilities in Linux allow attackers to execute remote commands via print jobs! Affected systems include Debian, Fedora, RHEL.  \n \nFind details of CVE-2024-47176 here: https://thehackernews.com/2024/09/critical-linux-cups-printing-system.html \n \nDisable \u2018cups-browsed\u2019 &amp; block UDP port 631 until patches arrive.", "creation_timestamp": "2024-09-27T14:34:54.000000Z"}, {"uuid": "ef90bd36-091c-4bfb-baed-bc54d55379c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "Telegram/Yfjl9RN0GeLXY9bMmWue6ZMJ8Qhlf06phKHOC1P1-O3oUDs", "content": "", "creation_timestamp": "2024-09-27T18:50:19.000000Z"}, {"uuid": "ca6d10b4-38a0-4372-ac77-c35039082564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3277", "content": "https://github.com/l0n3m4n/CVE-2024-47176\n\nUnauthenticated RCE on cups-browsed (exploit and nuclei template)\n#github #exploit", "creation_timestamp": "2024-10-03T19:25:53.000000Z"}, {"uuid": "e4ec743a-2eb4-4ba5-abda-8e62cac3acf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11196", "content": "#Threat_Research\n1. Watchguard Unauthenticated and Unencrypted SSO Protocol\nhttps://www.redteam-pentesting.de/en/advisories/rt-sa-2024-006\n2. Attacking UNIX Systems via CUPS (CVE-2024-47076, CVE-2024-47115, CVE-2024-47176, CVE-2024-47177)\nhttps://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I\n]-&gt; https://github.com/RickdeJager/cupshax", "creation_timestamp": "2024-09-28T07:25:32.000000Z"}, {"uuid": "5f4c0fa6-0dc9-404c-9e8c-833777d7b5ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47176", "type": "published-proof-of-concept", "source": "Telegram/TAtjTOaDEPJ1bR_5ctFOaG1Hic1PWf8X_vOVFA5gLQr4", "content": "", "creation_timestamp": "2024-11-11T18:35:39.000000Z"}]}