{"id":3321,"date":"2024-10-03T09:36:12","date_gmt":"2024-10-03T17:36:12","guid":{"rendered":"https:\/\/www.antivirusaz.com\/faq\/?post_type=ht_kb&#038;p=3321"},"modified":"2025-04-07T10:50:57","modified_gmt":"2025-04-07T18:50:57","slug":"what-is-cupid-vulnerability","status":"publish","type":"ht_kb","link":"https:\/\/www.antivirusaz.com\/faq\/art\/what-is-cupid-vulnerability\/","title":{"rendered":"What is CUPID vulnerability?"},"content":{"rendered":"<p>The <strong>CUPID vulnerability<\/strong> refers to a series of recently identified security flaws in the Common UNIX Printing System (CUPS). These vulnerabilities, including CVE-2024-47176 and CVE-2024-47177, allow attackers to potentially execute remote code on systems using vulnerable versions of CUPS. This can be exploited by sending malicious Internet Printing Protocol (IPP) requests, leading to unauthorized access or control of affected devices. The vulnerabilities are considered critical due to their widespread impact across UNIX-like systems, including Linux and macOS.<\/p>\n<p>Sources for more information:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/what-we-know-so-far-about-zero-day-cups-vulnerabilities-cve-2024-47176-cve-2024-47076-cve-2024-47175-and-cve-2024-47177\/\" target=\"_blank\" rel=\"noopener\">Trustwave<\/a><\/li>\n<li><a href=\"https:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2024-1967\" target=\"_blank\" rel=\"noopener\">Talos Intelligence<\/a><\/li>\n<li>CVE Details: <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-47176\" target=\"_blank\" rel=\"noopener\">CVE-2024-47176<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-47177\" target=\"_blank\" rel=\"noopener\">CVE-2024-47177<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CUPID vulnerability refers to a series of recently identified security flaws in the Common UNIX Printing System (CUPS). These vulnerabilities, including CVE-2024-47176 and CVE-2024-47177, allow attackers to potentially execute remote code on systems using vulnerable versions of CUPS. This can be exploited by sending malicious Internet Printing Protocol (IPP) requests, leading to unauthorized access [&hellip;]<\/p>\n","protected":false},"author":1,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"ht-kb-category":[12],"ht-kb-tag":[403,404,405],"class_list":["post-3321","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-threats-vulnerabilities","ht_kb_tag-cupid","ht_kb_tag-cve-2024-47176","ht_kb_tag-cve-2024-47177"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is CUPID vulnerability?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.antivirusaz.com\/faq\/art\/what-is-cupid-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is CUPID vulnerability?\" \/>\n<meta property=\"og:description\" content=\"The CUPID vulnerability refers to a series of recently identified security flaws in the Common UNIX Printing System (CUPS). These vulnerabilities, including CVE-2024-47176 and CVE-2024-47177, allow attackers to potentially execute remote code on systems using vulnerable versions of CUPS. This can be exploited by sending malicious Internet Printing Protocol (IPP) requests, leading to unauthorized access [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.antivirusaz.com\/faq\/art\/what-is-cupid-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Antivirus and Security Software FAQs &amp; Blog\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-07T18:50:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.antivirusaz.com\/faq\/wp-content\/uploads\/2023\/02\/antivirusaz-faq-blog-logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/art\\\/what-is-cupid-vulnerability\\\/\",\"url\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/art\\\/what-is-cupid-vulnerability\\\/\",\"name\":\"What is CUPID vulnerability?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#website\"},\"datePublished\":\"2024-10-03T17:36:12+00:00\",\"dateModified\":\"2025-04-07T18:50:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/art\\\/what-is-cupid-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/art\\\/what-is-cupid-vulnerability\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/art\\\/what-is-cupid-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is CUPID vulnerability?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#website\",\"url\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/\",\"name\":\"Antivirus and Security Software FAQs & Blog\",\"description\":\"Frequently asked questions about antivirus and security software, and other computer security related issues.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#organization\"},\"alternateName\":\"AntivirusAZ.com FAQs & Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#organization\",\"name\":\"AntiVirusAZ.com\",\"url\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/antivirusaz-faq-blog-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/antivirusaz-faq-blog-logo.png\",\"width\":1536,\"height\":512,\"caption\":\"AntiVirusAZ.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is CUPID vulnerability?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.antivirusaz.com\/faq\/art\/what-is-cupid-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"What is CUPID vulnerability?","og_description":"The CUPID vulnerability refers to a series of recently identified security flaws in the Common UNIX Printing System (CUPS). These vulnerabilities, including CVE-2024-47176 and CVE-2024-47177, allow attackers to potentially execute remote code on systems using vulnerable versions of CUPS. This can be exploited by sending malicious Internet Printing Protocol (IPP) requests, leading to unauthorized access [&hellip;]","og_url":"https:\/\/www.antivirusaz.com\/faq\/art\/what-is-cupid-vulnerability\/","og_site_name":"Antivirus and Security Software FAQs &amp; Blog","article_modified_time":"2025-04-07T18:50:57+00:00","og_image":[{"width":1536,"height":512,"url":"https:\/\/www.antivirusaz.com\/faq\/wp-content\/uploads\/2023\/02\/antivirusaz-faq-blog-logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.antivirusaz.com\/faq\/art\/what-is-cupid-vulnerability\/","url":"https:\/\/www.antivirusaz.com\/faq\/art\/what-is-cupid-vulnerability\/","name":"What is CUPID vulnerability?","isPartOf":{"@id":"https:\/\/www.antivirusaz.com\/faq\/#website"},"datePublished":"2024-10-03T17:36:12+00:00","dateModified":"2025-04-07T18:50:57+00:00","breadcrumb":{"@id":"https:\/\/www.antivirusaz.com\/faq\/art\/what-is-cupid-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.antivirusaz.com\/faq\/art\/what-is-cupid-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.antivirusaz.com\/faq\/art\/what-is-cupid-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.antivirusaz.com\/faq\/"},{"@type":"ListItem","position":2,"name":"What is CUPID vulnerability?"}]},{"@type":"WebSite","@id":"https:\/\/www.antivirusaz.com\/faq\/#website","url":"https:\/\/www.antivirusaz.com\/faq\/","name":"Antivirus and Security Software FAQs & Blog","description":"Frequently asked questions about antivirus and security software, and other computer security related issues.","publisher":{"@id":"https:\/\/www.antivirusaz.com\/faq\/#organization"},"alternateName":"AntivirusAZ.com FAQs & Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.antivirusaz.com\/faq\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.antivirusaz.com\/faq\/#organization","name":"AntiVirusAZ.com","url":"https:\/\/www.antivirusaz.com\/faq\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.antivirusaz.com\/faq\/#\/schema\/logo\/image\/","url":"https:\/\/www.antivirusaz.com\/faq\/wp-content\/uploads\/2023\/02\/antivirusaz-faq-blog-logo.png","contentUrl":"https:\/\/www.antivirusaz.com\/faq\/wp-content\/uploads\/2023\/02\/antivirusaz-faq-blog-logo.png","width":1536,"height":512,"caption":"AntiVirusAZ.com"},"image":{"@id":"https:\/\/www.antivirusaz.com\/faq\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/ht-kb\/3321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/comments?post=3321"}],"version-history":[{"count":1,"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/ht-kb\/3321\/revisions"}],"predecessor-version":[{"id":3322,"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/ht-kb\/3321\/revisions\/3322"}],"wp:attachment":[{"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/media?parent=3321"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/ht-kb-category?post=3321"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/ht-kb-tag?post=3321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}