Advisory

Vulnerabilities reported in CUPS system for Linux

Take action: Finally not an urgent patch. Ideally, if not used disable cups-browsed and plan an update of the cups packages.


Learn More

Two vulnerabilities are reported in the Linux Common Unix Printing System (CUPS). The printing system vulnerabilities affect the core CUPS infrastructure that is installed by default on most Linux distributions and automatically listens for network printer announcements. 

Vulnerabilities summary:

  • CVE-2025-58060 (CVSS score 7.8) - Authentication bypass vulnerability affecting CUPS configurations using non-Basic authentication methods. It allows attackers to bypass password verification by sending Authorization: Basic headers when the system expects different authentication types. This flaw grants unauthorized access to CUPS administrative functions, potentially allowing attackers to modify printer configurations, access print queues, or execute administrative commands.
  • CVE-2025-58364 (CVSS score 6.5) - Remote denial-of-service vulnerability caused by unsafe deserialization and validation of printer attributes within the libcups library. It allows attackers to trigger a null pointer dereference through crafted printer attribute responses, causing system crashes across local networks.

Network administrators should restrict IPP port 631 access through firewalls and disable the cups-browsed service on systems that don't require automatic printer discovery. For the authentication bypass vulnerability, temporarily reverting to AuthType Basic with strong passwords provides immediate protection until patches become available. 

No patches are currently available for CVE-2025-58364, while CVE-2025-58060 has been fixed in CUPS version 2.4.13.

Vulnerabilities reported in CUPS system for Linux