
How Internal Scanning works: Q&A with Detectify’s product expert
Security doesn’t stop at the perimeter. The “inside” of your network often harbors many overlooked risks. To address this, ealier this year we launched Detectify Internal …

A critical chained vulnerability (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177) has been detected within the open-source printing system CUPS (present in most Linux distributions). Attackers can achieve remote code execution, potentially leading to complete control of the vulnerable system. Detectify customers can assess whether their systems are running affected versions of CUPS.
On Thursday, September 26th, security researcher evilsocket published a write-up alongside a PoC that was published on a critical severity GNU/Linux unauthenticated RCE affecting the CUPS open-source printing system.
Attackers can execute arbitrary code on a victim’s machine if the cups-browsed service is enabled by sending a malicious request to the vulnerable device (through an IPP server) on a network the victim has access to and getting the victim to run a print job from the affected device.
Detectify security researchers and engineers have released a product update that allows all Detectify Surface Monitoring customers to check whether their systems are running affected versions of CUPS. Users can visit the Overview page in the UI for a risk assessment indicator and they are advised to make sure that Surface Monitoring is active on the domains they want to verify.

The risk status of the CUPS exploit on customers’ attack surface is now highlighted on the Overview page.
The following four CVEs were assigned to CUPS vulnerabilities linked with this attack. When chained, attackers can potentially execute RCE (remote code execution):
Until patches are released, Detectify recommends the following mitigation steps for this issue:
sudo systemctl status cups-browsedsudo systemctl stop cups-browsedsudo systemctl disable cups-browsedCustomers can always find updates in the “What’s New at Detectify” product log. Any questions can be directed to Customer Success representatives or Support. If you’re not already a customer, click here to sign up for a demo or a free trial and immediately start scanning. Go hack yourself!

Security doesn’t stop at the perimeter. The “inside” of your network often harbors many overlooked risks. To address this, ealier this year we launched Detectify Internal …

Maintaining a secure external attack surface is no longer just about finding vulnerabilities; it’s about proving your resilience to partners, auditors, and regulatory bodies. Today, …