Discover What Is at Risk: Real-World Examples of a RCE CUPS Attack, and How to Detect, Investigate, and Respond in Minutes with Spyderbat (Powered by eBPF)
Introduction:
During this week, the security community has discovered a RCE vulnerability in Common UNIX Printing System (CUPS), a widely-used printing protocol in UNIX systems. While the scores for the CVEs involved are not set in stone, the highest among them may be given a higher severity score than Heartbleed.
Systems running the cups-browsed Linux service may be exploited. These services are included in many UNIX system including:
Misconfigurations and weaknesses in CUPS can be exploited by attackers to gain unauthorized access or control. Key attack vectors include:
This report above shows the number of devices exposing the port used by CUPS on the open internet. If, configured without proper authentication these systems could be affected immediately.
Real World Example
A real world example of this is if a remote attacker adds or replaces existing printers (printer drivers) with malicious ones. When a print job is executed through the malicious printer driver, it can trigger an execution of malicious code. The malicious code, when executed can
The Spyderbat threat investigations team ran a real world example of how to detect, investigate and respond to this particular attack.
How to See If You Are Impacted the Traditional way
Check for the services:
Disable the services:
These commands must be ran on every system for a full vulnerability scan. Want to find a faster way to check? Trying to find processes executed under foomatic-rip? Try Spyderbat!
How to See If You Are Impacted (Using Spyderbat) in minutes
Using Spyderbat, built on eBPF, you can determine instant root cause with our flashback feature in minutes eliminating the pain of scanning security events and logs.
To discover if you are impacted by the CUPs vulnerability, try Spyderbat’s free tier (forever free) to detect, investigate, and respond (for Linux, Hybrid, and Multi-Cloud, and Kubernetes).
Detection and Investigation
You can detect the existence of the cups-browsed service in 1 of two waysYou can detect exploited systems using Spyderbat Scout detections and:
You can also take action via the manual response actions killing the processes associated with cupsd and cups-browsed
Spyderbat’s Threat Investigation team has created a Linux Cups Vulnerability Assessment Report:
Spyderbat's solution to these challenges is the Behavioral Context Web, a revolutionary approach that records and links all contextual data in real-time. This continuous recording ensures that all processes, connections, containers, pods, clusters, users, and APIs are tracked, maintaining causal links across the entire environment. This extensive recording capability (3 months and more) enables unparalleled visibility into your Linux, Kubernetes and or multi-cloud infrastructure.
How Spyderbat's Behavioral Context Web Changes Everything for Linux, Kubernetes, and Multi-Cloud
The Behavioral Context Web introduces a paradigm shift in how security alerts are managed and responded to:
Spyderbat provides true detection and response for Linux, Kubernetes and multi-cloud. See how you can:
Compare Spyderbat's critical capabilities with other security solutions to see where they fall short. Elevate your Linux, Kubernetes, and multi-cloud security.