is this exploit over hyped? (9.8 CVSS btw)

แชร์
ฝัง
  • เผยแพร่เมื่อ 14 พ.ย. 2024

ความคิดเห็น • 734

  • @highdefinist9697
    @highdefinist9697 หลายเดือนก่อน +1276

    So, just to clarify for myself, if I (roughly) understood how this works:
    Attacker: Hi, I am a printer!
    Victim: Hi, nice to meet you, what files can you print?
    Attacker: I support the ThisIsAVirus format.
    Victim: Oh, interesting. How do I decode that file format?
    Attacker: It's super easy, barely an inconvenience, here you have the appropriate ExecuteThisVirus decoder.
    Victim: Thanks, I will implement the ExecuteThisVirus decoder the next time I need to print something.

    • @cdoublejj
      @cdoublejj หลายเดือนก่อน +127

      Thank you! Just saved me 13 minutes!

    • @marianarlt
      @marianarlt หลายเดือนก่อน +70

      Best summary! Could be a children's book ❤

    • @redo1700
      @redo1700 หลายเดือนก่อน +19

      @@highdefinist9697 Does the attacker need to be at the victim’s house?

    • @revanisalive
      @revanisalive หลายเดือนก่อน +60

      super easy! barely an inconvenience!

    • @ImSquiggs
      @ImSquiggs หลายเดือนก่อน +40

      Love to start my day off with a random Ryan George reference, haha

  • @keyboard_g
    @keyboard_g หลายเดือนก่อน +1632

    This is why Windows is more secure. Printers just never work on it.

    • @EwanMarshall
      @EwanMarshall หลายเดือนก่อน +50

      In truth, printer provides binary driver which is run as system on windows. Though it does try to find an uptodate one on windows update first, of which there are several with known vulnerabilities in them.

    • @JPs-q1o
      @JPs-q1o หลายเดือนก่อน +11

      LOL

    • @TechnoMinded-qp5in
      @TechnoMinded-qp5in หลายเดือนก่อน

      Even Windows 10 is good enough after End of Life guess I am holding off on the switch because even Linux isn't safe I knew for some reason I was being pulled back to Windows and suddenly this pops up.

    • @GuilhermeSilva-pn6rm
      @GuilhermeSilva-pn6rm หลายเดือนก่อน +18

      @@TechnoMinded-qp5in On windows vulnerabilities happens everyday.
      On Linux happens like every few months or years depending on how it gets detected.
      That's why you see headlines everyday about vulnerabilities on windows than on linux. But there is already a fix for this vulnerability. So i dont think you should be worried but oh well.

    • @EwanMarshall
      @EwanMarshall หลายเดือนก่อน +11

      @@TechnoMinded-qp5in you know I have this already patched on my linux systems, a similar issue has been known to exist in windows since 2021... it is 2024 now.

  • @keco185
    @keco185 หลายเดือนก่อน +575

    I tried watching this video but I ran out of cyan

    • @ssmith5048
      @ssmith5048 หลายเดือนก่อน +3

      nah, just really really likes black

    • @thewhitefalcon8539
      @thewhitefalcon8539 หลายเดือนก่อน +14

      Need yellow to print the tracking dots

    • @Hezeri
      @Hezeri หลายเดือนก่อน +9

      Tried switching to black&white, but still didn't allow it due to lack of cyan.

    • @cohan88
      @cohan88 หลายเดือนก่อน

      Brilliant 🤣🤣

  • @krityaan
    @krityaan หลายเดือนก่อน +716

    RIP HP Printer. You didn't achieve much at all.

    • @sparquisdesade
      @sparquisdesade หลายเดือนก่อน +72

      And nothing of value was lost

    • @grostoss4259
      @grostoss4259 หลายเดือนก่อน +2

      Lets hope ilo is next

    • @alc5440
      @alc5440 หลายเดือนก่อน +5

      It doesn't deserve to rest in peace.

    • @davester4545
      @davester4545 หลายเดือนก่อน +5

      Rip could also mean "rest in pieces" which for hp, would be accurate xD

    • @execration_texts
      @execration_texts หลายเดือนก่อน +3

      ​@@davester4545
      *Cut to scene from Office Space

  • @sush7117
    @sush7117 หลายเดือนก่อน +289

    printer autoconnects to new PC
    normal person: oh cool
    security researcher: *squints*

    • @HDL_CinC_Dragon
      @HDL_CinC_Dragon หลายเดือนก่อน +16

      This gave me a good laugh and it's so true hahaha

    • @johan7999
      @johan7999 หลายเดือนก่อน +6

      4 Zero Days: *Starts Sweating*

  • @RobertFerentz
    @RobertFerentz หลายเดือนก่อน +624

    I will call this the '2 hackers 1 CUPS` CVE.

    • @Vinnie_PT
      @Vinnie_PT หลายเดือนก่อน +39

      That is both disgusting and hilarious. I approve 👍

    • @lightyagami1752
      @lightyagami1752 หลายเดือนก่อน +14

      2 geeks 1 CUPS

    • @tablettablete186
      @tablettablete186 หลายเดือนก่อน +5

      OH NO, DON'T DO IT!!! NNNOOOOOO

    • @rumplstiltztinkerstein
      @rumplstiltztinkerstein หลายเดือนก่อน +4

      gonna get some chocolate icecream now

    • @WarkWarbly
      @WarkWarbly หลายเดือนก่อน +24

      This comment is definitely a 9.9

  • @Uerdue
    @Uerdue หลายเดือนก่อน +358

    But... the important question is of course... does this exploit work on Tuesdays?

    • @CrypticBore
      @CrypticBore หลายเดือนก่อน +6

      @Uerdue considering you could use a print to pdf imposter yes

    • @Yadobler
      @Yadobler หลายเดือนก่อน +25

      Only with OpenOffice

    • @ninetydirectory3798
      @ninetydirectory3798 หลายเดือนก่อน +4

      @@Yadobler Such an OOO scenario.

    • @dantenotavailable
      @dantenotavailable หลายเดือนก่อน +4

      Probably works more often than my freaking printer does.

    • @miguelu4186
      @miguelu4186 หลายเดือนก่อน +2

      based

  • @AlexSwanson-rw7cv
    @AlexSwanson-rw7cv หลายเดือนก่อน +442

    Wow, executing arbitrary commands *by design*.

    • @Imperial_Squid
      @Imperial_Squid หลายเดือนก่อน +31

      Remember kids, never exec arbitrary code, unless you're a core part of the Linux kernel I guess, real "do as I say, not as I do" vibes lol

    • @AlexSwanson-rw7cv
      @AlexSwanson-rw7cv หลายเดือนก่อน +13

      @@Imperial_Squid I thought this was userspace?

    • @framegrace1
      @framegrace1 หลายเดือนก่อน +34

      ​@@AlexSwanson-rw7cv It is. That file is still executed as the nobody user (some distros have a cups user). So the exploit is not dangerous by itself.
      It can be the entry method for any other local attack thou..

    • @nnnik3595
      @nnnik3595 หลายเดือนก่อน +7

      @@framegrace1 cups is run as root on some systems

    • @cfillion
      @cfillion หลายเดือนก่อน +12

      @@Imperial_Squid CUPS is not part of nor related to the Linux kernel.

  • @mattilindstrom
    @mattilindstrom หลายเดือนก่อน +200

    Released 25 years ago, approaching net security like it was still Arpanet days. Way to go CUPS!

    • @itskdog
      @itskdog หลายเดือนก่อน +18

      And it's made by Apple, as well

    • @qdaniele97
      @qdaniele97 หลายเดือนก่อน +24

      To be fair, it's like that mostly because it has to support all the weird and/or obsolete shit that printers still do these days 😅

  • @rbgtk
    @rbgtk หลายเดือนก่อน +45

    I feel a fun little honeypot idea coming up by setting up a dummy cups server, expose it publicly and see what kind of printers get added

    • @the-answer-is-42
      @the-answer-is-42 หลายเดือนก่อน +5

      You can even put it in the cloud. I heard that Azure data centers are routinely scanned by malicious actors, so if you put it in a VM there, someone might notice your dummy cups server and spend time to investigate (not sure if it was specifically SSH and RDP that were attacked or more things, though). Of course, other cloud providers may be in a similar situation, I just heard about it in the context of Azure.

  • @marianarlt
    @marianarlt หลายเดือนก่อน +118

    I find it funny how the internet just assumes that businesses never expose unnecessary services to anybody in their networks or the internet and that your usual employee would never ever consider clicking messages away or use the wrong printer that magically appeared in their settings. Good luck!

    • @deefdragon
      @deefdragon หลายเดือนก่อน +46

      I saw a lot of people dissing this because a user had to print and I was looking at face-palming. imagine a user seeing "use this printer!" in the printer list. at minimum one user is going to use it to print. and that's all it takes.

    • @smiths7317
      @smiths7317 หลายเดือนก่อน +4

      "Arm chair people assumes businesses."

    • @chicomojo
      @chicomojo หลายเดือนก่อน +19

      @@deefdragon Most people *here* would just use that printer, myself included.

    • @imax9000
      @imax9000 หลายเดือนก่อน +26

      @@deefdragon even better - just copy the name of another boring printer you've found on the same network. Nobody will be surprised at all to see two printers with the same name.

    • @lizardkeeper100
      @lizardkeeper100 หลายเดือนก่อน +19

      @deefdragon I would 100% click the wrong printer at some point because I don't think I have ever used a printer when there weren't 10 people trying to ask me 100 questions about their technical issues.

  • @engineeranonymous
    @engineeranonymous หลายเดือนก่อน +54

    This is pretty bad for places where you are already on the network like universities. You'll hop on to other systems from your primary ingress point.

  • @truckerallikatuk
    @truckerallikatuk หลายเดือนก่อน +191

    ...And as I'm watching this, my Mint updater pushes a CUPS update...

    • @ChronoNewton
      @ChronoNewton หลายเดือนก่อน +6

      same😂😂

    • @jmvr
      @jmvr หลายเดือนก่อน

      My Kubuntu snap store did the exact same

    • @radical-nation9729
      @radical-nation9729 หลายเดือนก่อน

      got mine last night

    • @chrisnelson414
      @chrisnelson414 หลายเดือนก่อน +7

      Fedora updated. Will check my Debian, Parrot and Steam Deck machines later.
      My OpenBSD or my NetBSD machines don't have CUPS installed.

    • @EwanMarshall
      @EwanMarshall หลายเดือนก่อน +1

      yep, ubuntu released patch yesterday, pretty sure other distros did too.

  • @ailivac
    @ailivac หลายเดือนก่อน +13

    I hope this gets a fix soon instead of everyone just disabling browsed, because IPP Everywhere (the stupidly-named protocol that enables this) is honestly the best thing to ever happen to printers for Linux users. It's basically a simple extension of IPP that instead of just allowing the printer to advertise itself but still need a vendor-specific driver unless it's some huge PostScript-enabled office machine, there's now a standard raster format printers are required to support that uses a driver that CUPS has built in. This isn't even a new thing - a large number of network printers have implemented it for well over a decade now, but software support only started appearing recently. Of course, the entire point of the protocol is that the printer doesn't need to instruct CUPS to execute any specific commands, just advertise support for a data format that it already knows how to handle, so it may be enough to just block foomatic-rip execution for PPDs loaded from the network (it sounds like the feature can't be removed altogether, but other use cases would involve a PPD provided by a locally-installed driver package that is more trusted).

    • @JPs-q1o
      @JPs-q1o หลายเดือนก่อน +2

      Well the PPDs can be pre-generated rather than tweaked on the fly from a similar one using foomatic-rip...or maybe the list of executables can be narrowed to only the GNU string manipulation tools needed. After 15+ years there's more than enough historical data to figure this out.

  • @JessicaFEREM
    @JessicaFEREM หลายเดือนก่อน +43

    If you're ever in the market for a printer, get a brother. Those things are so easy to use and they just work no matter the OS, except Android which requires mopria, but that's just android being weird.
    I had my printer up and running within 10 minutes and that was it. No custom bloatware or Linux incompatibility.
    I can't rate my experience with brother highly enough.
    The only silly thing is that it makes my power flicker when it runs but I just unplug the printer when im not using it.
    If you dont use color then get a b+w laser printer. If you only print color once every 5 years you can just go to a store and get it printed, the $.15 a page or whatever will likely be cheaper than buying color ink anyways, or you can get a color lazer printer by brother, so you dont have to waste ink because toner doesnt dry out.

    • @darmandez
      @darmandez หลายเดือนก่อน +35

      Instructions unclear, parents got me a sister instead

    • @subjekt5577
      @subjekt5577 หลายเดือนก่อน

      Eh works fine for me on android without such

    • @JPs-q1o
      @JPs-q1o หลายเดือนก่อน +2

      I agree. I used to recommend HP because they were reliable and supported FLOSS print systems but with all their scammy anti-repair and ink-refill activities brother is a good choice. I like how their inkjet cartridges have a vaccuum-seal so, unlike certain aforementioned competitors, they don't dry out quickly if printing activity is sparse.

    • @paulie-g
      @paulie-g หลายเดือนก่อน

      Another big advantage of Brother laser printers (no point in getting inkjet in 2024) is that they happily take 3rd party toner and drums, and their own toner/drums are reasonably priced.

    • @ladislavseps4801
      @ladislavseps4801 หลายเดือนก่อน

      Get OKI colored laser printer, they have (or at least use to have) the installed "test" cartridges without any DRM chips and you can do reset, including the page counter in the service menu. Even if you don't reset anything, they print even if "you are out of toner" (with a warning). Only annoing thing about colored laser printers is the fingerprinting by printing yellow dots...(thanks USA money laws)

  • @framegrace1
    @framegrace1 หลายเดือนก่อน +5

    Clarify, that script is executed as whatever the cups daemon user is. (nobody on most places). So all it does by itself, at most, is to execute a random script as the same user as the cups daemon. This is usually the first stage of an ownage, but just to clarify.

  • @jademonass2954
    @jademonass2954 หลายเดือนก่อน +2

    im currently taking cybersecurity classes and i cannot explain how happy i got understanding what CVSS actually means
    thank you for these videos btw!

  • @FurqanHun
    @FurqanHun หลายเดือนก่อน +5

    While reading the blog before most of the technical stuff went over my head but i did understood that the attacker needed to disguide the system as printer using port 631 and the vitcim needs to use it for it to work, so 9.9 CCVE obv didn't made any sense for a normal user however it does make sense for companies where there are more printers and its easier to disguise… and a company would also be the one to take the most damage of off the attack…

  • @ImNotAYoutuber0
    @ImNotAYoutuber0 หลายเดือนก่อน

    Any research with results and explained how they researched it deserves props.

  • @edoardottt
    @edoardottt หลายเดือนก่อน +86

    although you got the name pronunciation wrong😅 ( search for the Italian pronunciation of the Italian name Simone), great explanation !! thanks❤

    • @alek002
      @alek002 หลายเดือนก่อน

      Very cool

    • @p99chan99
      @p99chan99 หลายเดือนก่อน

      I guessed he was Italian, cool

    • @alphadexxa
      @alphadexxa หลายเดือนก่อน +10

      Could have been a female, Simone is a common female name in Scandinavia

    • @3msEEv
      @3msEEv หลายเดือนก่อน +7

      In german it'd be a female name

    • @happydawg2663
      @happydawg2663 หลายเดือนก่อน +6

      @@alphadexxa In Italian Simone is for male, while Simona or Simonetta is for female.

  • @YaySyu
    @YaySyu หลายเดือนก่อน +24

    Hey you guys remember that PrinterNightmare exploit for windows that was discovered in 2021? Yeah its still vulnerable...

    • @o0Donuts0o
      @o0Donuts0o หลายเดือนก่อน +5

      Is it? Is it really? I’m asking sarcastically because I know you don’t know what you’re talking about.

    • @YaySyu
      @YaySyu หลายเดือนก่อน +5

      @@o0Donuts0o Oh look its the àùťîśm hour I guess. Who invited you?

  • @KevinDay
    @KevinDay หลายเดือนก่อน +14

    We should just drop the number rating from CVE's. It's utterly pointless at this point.

  • @BobDerFlossmeister-zj1qk
    @BobDerFlossmeister-zj1qk หลายเดือนก่อน +14

    I could see state actors being VERY interested in this exploit or maybe even already using it for a long time
    Something like the recent supply chain attack by Israel comes to mind: Set up a proxy company that sells printers with modified firmware and your victim even invites you in

    • @johnpeterson9152
      @johnpeterson9152 หลายเดือนก่อน +2

      @@BobDerFlossmeister-zj1qk How many high value targets of state sponsored actors are running Linux??

    • @calvin7330
      @calvin7330 หลายเดือนก่อน

      @@johnpeterson9152 If Android is vulnerable...

    • @05Matz
      @05Matz หลายเดือนก่อน +2

      @@johnpeterson9152 Businesses and infrastructure mostly, not _individuals_ exactly.

  • @VioFax
    @VioFax หลายเดือนก่อน +10

    Bluetooth has gotten really unsafe to use in my neighborhood.
    I had an ESP 32 device kick my headset, spoof the headset. set up a virtual LAN connection, and then started trying other vulnerabilities before i caught it. It spread to 2 other systems on my network. And started trying to exfiltrate data.
    Stay off bluetooth. Its not worth the convenience.

  • @dmi3mis
    @dmi3mis หลายเดือนก่อน +25

    If you open 631/tcp port from all over internet and allow unauthenticed traffic, you are made a mistake.

    • @chocolate_squiggle
      @chocolate_squiggle หลายเดือนก่อน +9

      You think no-one ever got hacked as long as they had a basic network-level packet-filtering firewall? Geeze.....

    • @JPs-q1o
      @JPs-q1o หลายเดือนก่อน

      @2m45s netstat told me that there's nothing listening on UDP port 361 so I'm totally safe 😁

    • @nickwallette6201
      @nickwallette6201 หลายเดือนก่อน +7

      @@chocolate_squiggle Well, it's a good start.

    • @nevelis
      @nevelis หลายเดือนก่อน +5

      @@chocolate_squiggle I can't see where he said he thought that 😆

    • @robertthomas5906
      @robertthomas5906 หลายเดือนก่อน

      It's not tcp. It's a udp port. That's right, udp. I know, right?

  • @connorkolan2597
    @connorkolan2597 หลายเดือนก่อน +8

    Me and my product manager just talked about implementing a cve tracker for our custom cups project and thought it was low priority xD. The timing

  • @rayjaymor8754
    @rayjaymor8754 หลายเดือนก่อน +18

    It's definitely a great and fantastic find.
    It's just that Simone's tweet tried to suggest he found something that was equivalent (or worse) than Log4j and the fact is, no. Not even close.
    It's very big, just, a little bit overhyped.

  • @SaltMineRanch
    @SaltMineRanch หลายเดือนก่อน +4

    Another way I can see to exploit this potentially is to become their printer, tee that to the real one and capture the data. One client I have thinks it's super convenient to copy-paste their credit card numbers, and those of their customers, into lots of forms and spreadsheets. They print these. Identifying as a printer might not be so harmless. edit: This is not behind their main firewall for automation systems, it's front office and basically unlocked because derps work in there.

  • @StephenSpencer1972
    @StephenSpencer1972 หลายเดือนก่อน +1

    Gotta say, cups has been a bit of an operational nightmare since its birth back in the 90's. The "solution" I used for a 400+ seat engineering lab I used to run: all printers are directly attached to a physically separate internal (edit: device management) network. Printers are statically defined on one or more print servers that have access to that internal network. No printer discovery in play. It was a curious-but-bad idea in 2002. Its less curious but every bit as bad of an idea today.
    (apologies in advance for choir-directed preaching)
    It's cool that you're giving props to the researcher that did this work. Beyond the severity overstatement, I do have to take several deep breaths to quiet the... irritation with the click-baity announcement. It's not only a disingenuous finger pointed at Linux, but it also obscures the (if you know, you know, otherwise..) fact that cups can be run on nearly any device that has an IP stack. Think of all the *BSD, windows and OSX users that thought they were off the hook.

  • @harrytsang1501
    @harrytsang1501 หลายเดือนก่อน +44

    Although it is indeed overhyped and none of my Debian servers are affected, Ubuntu is affected by default and the word "Ubuntu" showed up over 150 times in our on-prem server list. What a day

    • @AlexSwanson-rw7cv
      @AlexSwanson-rw7cv หลายเดือนก่อน +6

      @@harrytsang1501 Is Ubuntu Server affected by default? Mine don't have any cups on, though maybe I deselected it on install or removed it at some point...

    • @abhimaanmayadam5713
      @abhimaanmayadam5713 หลายเดือนก่อน +1

      Ubuntu server didn't seem to have it. My non server debian boxes did have it. I'm not worried about servers. I'm worried about weird embedded systems. Like PoS machines.

    • @arthurmoore9488
      @arthurmoore9488 หลายเดือนก่อน

      Given the nature of the vuln, it's more if it is listening on port 631. Since it sounds like you're in a corporate environment I'm going to assume you have a firewall for all of those servers. Meaning all you have to do is check the firewall rules.

  • @DrDarkRyder
    @DrDarkRyder หลายเดือนก่อน +5

    It seems that in computer security research, as in science, the most exciting phrase isn't "Eureka!", but "Huh… that's odd."

  • @tuerkismelon8483
    @tuerkismelon8483 หลายเดือนก่อน +1

    I like that the author of the article talks about a Part II or even a Part III.

  • @Veptis
    @Veptis หลายเดือนก่อน

    Someone shared this on discord and most people were sceptical. I just knew the LLL video would be a great summary, so I am here now. thanks!

  • @mawnkey
    @mawnkey หลายเดือนก่อน +5

    If you open/forward ports for services only intended for LAN use, you deserve this exploit.

    • @Ether_Void
      @Ether_Void หลายเดือนก่อน +5

      @@mawnkey You shouldn't blindly trust the LAN either. This would be a very easy way to hop from one infected client to another.

    • @mawnkey
      @mawnkey หลายเดือนก่อน +1

      @@Ether_Void Obviously. I'm sure we'll see this exploited in horizontal movements across networks. I've always applied the concept of minimizing attack surface within networks for just that reason.
      Also printers are the devil and this is just further proof.

  • @ankk98
    @ankk98 หลายเดือนก่อน

    Very well said. Curiosity and questioning things are very important to find such issues.

  • @JamieBainbridge
    @JamieBainbridge หลายเดือนก่อน +77

    The biggest thing I learnt here is how NOT to interact with the software security community.

    • @ADHJkvsNgsMBbTQe
      @ADHJkvsNgsMBbTQe หลายเดือนก่อน +3

      ^ this.

    • @jylpah
      @jylpah หลายเดือนก่อน

      Yep. A disclosure written as a FU idiots post. Looked immature.

    • @paulie-g
      @paulie-g หลายเดือนก่อน +8

      How about no. The guy reporting it spread lies and FUD (no, this is not a 'no interaction RCE', it's not 'Linux' etc), hyped his CVEs, and pretended not to understand that cups - a very old, hairy codebase that has to do unpalatable things because of 0 driver support from manufacturers and maintained by a very small group of volunteers who get 0 credit because it's not a sexy project - is somehow horrible through incompetence or malice, rather than lack of volunteer time.

    • @Gregorius421
      @Gregorius421 หลายเดือนก่อน +4

      exactly. it was unprofessional

    • @ThylineTheGay
      @ThylineTheGay หลายเดือนก่อน

      @@paulie-g okay, sure i'll grant that that's true.. _but_ all those can be genuine mistakes, *and* they don't deserve harassment for it

  • @rallisf1
    @rallisf1 หลายเดือนก่อน +2

    cups-browsed is a desktop package, this doesn't affect servers at all. There's close to zero desktop linux PCs with a public IP. Even homelab/IoT devices are mostly behind NAT with certain ports open, certainly not UDP/631.
    That said; it's still a major backdoor for anyone already inside a LAN with Linux Desktops.

  • @garanceadrosehn9691
    @garanceadrosehn9691 หลายเดือนก่อน +2

    A very helpful walkthrough of what's involved here. I've been a printer-support person at my college for many years, and due to that I'm quite aware that CUPS is a mess wrt security. I just did a quick check, and of some 220 linux hosts that I have some responsibility for, about six *might* be effected by this. And I think only one of those needs to have CUPS running at all.
    Good work by the security-researcher guy. It's a shame that this got pre-announced as 9.9, as the "letdown" (???) from that claim makes people upset with the whole event.

  • @mdanicich
    @mdanicich หลายเดือนก่อน +2

    The problem I have with what Simone posted is less about the CVSS score and more about saying it affects *all* GNU/Linux systems. This implied to many people that it was a kernel-level RCE. Once it came out that it was CUPS I went from having to panic about all of my Linux systems down to disabling CUPS on my laptop. That bottom paragraph says to me that he posted that X/Twitter out of frustration in dealing with the devs who were dragging their feet to try and light a fire, but now it's getting him unfairly roasted.

    • @Madinko12
      @Madinko12 หลายเดือนก่อน +2

      "Unfairly"? Completely deserved.

  • @mechwarrior83
    @mechwarrior83 หลายเดือนก่อน +7

    thank you for the great explanation!

  • @CYI3ERPUNK
    @CYI3ERPUNK หลายเดือนก่อน

    for decades i have marveled at how many exploits exist solely/entirely around the printer sub-device architecture ; ive been a computer builder/nerd for 30+ years and i have never had a printer connected to my home devices XD

  • @loganiushere
    @loganiushere หลายเดือนก่อน +1

    Before anything else, if it’s an exploit in cups, it’s not a vulnerability in every Linux system. For example, I run a server that doesn’t have cups installed because I removed it.

  • @arashai
    @arashai หลายเดือนก่อน

    THANK YOU for using a video title that actually describes the video ❤

  • @dataolle
    @dataolle หลายเดือนก่อน +39

    sooo, it's not a linux bug, it is a cups bug. majority of servers does not have cups installed. this was hyped like it was a RCE in the kernel.

    • @robertthomas5906
      @robertthomas5906 หลายเดือนก่อน

      No one is mentioning that CUPS was bought by Apple about 15 years ago. Thanks apple for that. The guy that was maintaining it departed Apple for his own company. So cups has been stagnant ever since. IMHO, this may be part of Simone's problem. The brain departed. Nobody to maintain it.

    • @paulie-g
      @paulie-g หลายเดือนก่อน +8

      Exactly. Nice exploit chain, lots of interesting stuff, then the guy goes "zomg Linux is one giant security hole and no one cares!", knowing full well that cups has nothing to do with Linux other than it runs on it (and on pretty much all other posixy systems). Lost all the cool points immediately. Not to mention, this isn't a commercial vendor, it's a small group of volunteers maintaining a very old, hairy codebase that has to deal with printer manufacturers not supporting anything other than windows.

  • @adamz01h
    @adamz01h หลายเดือนก่อน +9

    Turns out a feature I've known for years is a security bug. 🎉

  • @Gareyress0
    @Gareyress0 หลายเดือนก่อน

    Thanks for the update. I heard Steve Gibson briefly speaking about this. Curious what he has to say about it on his next show.

  • @rsdyeahh
    @rsdyeahh หลายเดือนก่อน

    Just a little of history.
    The Foomatic interface emerged when there was a bit of competition over the printing standard on Linux: LPD, LPRNG and CUPS.
    Cups being the new kid on the block.
    The problem start that many printers do not have a drive for Linux or the closed drivers are worse than the open source ones (e.g. ghostscript).
    Other issues comes to the fact that many printers are are just a rebrand of another model and mapping what working with which was needed.
    So this is what the Linux Printing Database did and Foomatic came out of it (like a winehq`s database for apps).
    It started with a band-aid to get the printer to work on Linux and it is astonishing to find out that even today it has not being improved.
    Also worth mentioning that Cups was bought by Apple a long time ago and is branded as a Apple product.

  • @metcaelfe
    @metcaelfe หลายเดือนก่อน

    I do enjoy the memes mid explanation, it keeps me engaged

  • @ace100hyper3
    @ace100hyper3 หลายเดือนก่อน

    Always an intelligent explanation of unintelligent software mistakes.

  • @bentomo
    @bentomo หลายเดือนก่อน

    Your printer impersonations are spot on!

  • @Teukka72
    @Teukka72 หลายเดือนก่อน

    Thanks for the heads-up, buttoned by CUPS'es up.

  • @locust76
    @locust76 หลายเดือนก่อน +22

    5:00 no CVE writeup is complete without a meme .jpg inserted in there somewhere 😂

    • @FamilyYoutubeTV-x6d
      @FamilyYoutubeTV-x6d หลายเดือนก่อน +13

      and sort of summarizes what's wrong with this society of memes. Memes are a waste of time, are predictable, not so funny after a while. And yes I am very funny at parties and I am not the police. See what I did there?

    • @ticler
      @ticler หลายเดือนก่อน +6

      @@FamilyTH-camTV-x6d everyone is a comedian nowadays

    • @HDL_CinC_Dragon
      @HDL_CinC_Dragon หลายเดือนก่อน +7

      @@FamilyTH-camTV-x6d You must be so fun at par---aw dang it

  • @subhashgottumukkala
    @subhashgottumukkala หลายเดือนก่อน

    no man i'm watching because i'm addicted to your channel

  • @pixelcatcher123
    @pixelcatcher123 24 วันที่ผ่านมา

    the meme implementation of this article is par excellence and made me laugh

  • @elly.b
    @elly.b หลายเดือนก่อน

    Loved watching you live with the primeagen. I need more cyan 😂😂😂

  • @cohan88
    @cohan88 หลายเดือนก่อน +12

    Y'all know Simone is the guy that gave us Bettercap & Pwnagotchi, right?

    • @Alfred-Neuman
      @Alfred-Neuman หลายเดือนก่อน +7

      Is it really a guy? In french "Simone" is a very female name.

    • @thewhitefalcon8539
      @thewhitefalcon8539 หลายเดือนก่อน +2

      ​@@Alfred-Neuman In English too. But different languages are different.

    • @BlueEyesWhiteTeddy
      @BlueEyesWhiteTeddy หลายเดือนก่อน +7

      @@Alfred-Neuman i looked it up. He's italian and in italian Simone is masculine pronounced using 3 syllables.

    • @Alfred-Neuman
      @Alfred-Neuman หลายเดือนก่อน +4

      @@BlueEyesWhiteTeddy
      Okay thanks, I was just curious. It's like the name "Sasha" for Russian guys, the first time I heard this I was a bit confused but it's a very common name for males in Russia...

    • @Alfred-Neuman
      @Alfred-Neuman หลายเดือนก่อน +3

      @@thewhitefalcon8539
      Yep, that's why I was asking... ;)
      Apparently he's Italian.
      (The more you know)

  • @shadowpenguin3482
    @shadowpenguin3482 หลายเดือนก่อน

    I don’t mind such a powerful print driver existing for compatibility reasons, but I think that everytime you use this printer it should show you that this powerful print driver is being used to execute this command ~
    So then if you trust the printer you can still print with it, but it might make you double check.

  • @Daktyl198
    @Daktyl198 หลายเดือนก่อน

    All I can think about is a workstation setup to print to the closest printer by default in an office. The worker printing probably prints 100 files a day, and never once looks at the printer they're using because it always goes to the closest printer. Just clicking through the popup with wrote memorization. I can see the same thing happening to a home user that only has one printer, and thus has never once looked at the "printer list" because it's never been populated. If it defaults to the attacking printer, both of these users would be screwed just for not assuming they have to look at their printer list every time they print.

  • @ayyjay91
    @ayyjay91 หลายเดือนก่อน

    Amazing breakdown. Thank you for the summary

  • @PtolemyPetrie
    @PtolemyPetrie หลายเดือนก่อน +3

    The crazy thing to me is that Ubuntu firewall is not enabled by default. 🥴😳

  • @talhaakram
    @talhaakram หลายเดือนก่อน +83

    Ah, yes! foomatic-rip the state mandated backdoor.

    • @HagenvonEitzen
      @HagenvonEitzen หลายเดือนก่อน +5

      Well, it has RIP in the name ...

    • @JPs-q1o
      @JPs-q1o หลายเดือนก่อน +10

      foomatic-rip had it's purpose a decade and a half ago, I remember those days. Printer manufacturers, other than HP, were being little twits and not even sharing postscript and capabilities used by their printers with open source devs and users. foomatic-rip allowed you to use printers not officially supported without a PPD file by using the PPD from a similar printer and tweaking it on the fly with the aforementioned tool.

    • @StephenSpencer1972
      @StephenSpencer1972 หลายเดือนก่อน +1

      @@JPs-q1o My brother!

  • @muizzsiddique
    @muizzsiddique หลายเดือนก่อน

    Never saw the tweet. I'm subscribed! 😎

  • @alexhiatt3374
    @alexhiatt3374 หลายเดือนก่อน

    "fuzzing is when you scream at a program and see what happens"
    that's such a good description oh my god

  • @stephenridgway2720
    @stephenridgway2720 หลายเดือนก่อน

    Simone's done a great job.

  • @toxyl3915
    @toxyl3915 หลายเดือนก่อน

    the name RIP suggests it's about a Raster Image Processor. those are used between a computer and a large format plotter, basically a server that takes control of, e.g., color profile transformations like RGB->CMYK (the printer is CMYK and doesn't know what to do with RGB).

    • @Knirin
      @Knirin หลายเดือนก่อน

      It converts postscript or pdf into the printers native raster format. The tool is less and less useful since Apple’s AirPrint and Google’s CloudPrint both decided on a PDF subset for print job submission.

  • @davesabra4320
    @davesabra4320 หลายเดือนก่อน

    foomatic raster image processor lets you convert pdfs to pixel base images for printing yer stuff out

  • @stephenreaves3205
    @stephenreaves3205 หลายเดือนก่อน

    I love the idea that fuzzing is just screaming at code and seeing what bugs crawl out

  • @dashcharger24
    @dashcharger24 หลายเดือนก่อน

    Printers never worked on my on Windows or MacOS, but always do work perfectly fine on Linux. :)

  • @imax9000
    @imax9000 หลายเดือนก่อน +19

    This is absolutely a huge deal for government and enterprise sectors. They often purchase printers in bulk, so you can easily pick a name that won't raise any eyebrows. Especially in govt, where security can be atrocious.
    You just walk into a court building, sit down in the waiting area, connect to Wi-Fi, add yourself as a printer to every host you can reach and wait a few minutes. There are tons of paperwork constantly being printed out, so you very quickly get your code running on a machine that has access to a lot of court data, and can modify most of it as well.
    Want a fancy registration plate for your car? Go to DMV and do the same. Want your speeding tickets dropped? Go to your police department and just delete them from the system.

    • @chocolate_squiggle
      @chocolate_squiggle หลายเดือนก่อน +7

      Well, one would hope public wifi in court buildings (and your other examples) doesn't allow access to internal networks where printers are attached.

    • @imax9000
      @imax9000 หลายเดือนก่อน +5

      @@chocolate_squiggle yeah, but it's a slim hope. People in IT dept are probably not paid enough to actually care

    • @Spartan322
      @Spartan322 หลายเดือนก่อน +5

      @@chocolate_squiggle You'd be surprised how crap government IT is.

    • @robertthomas5906
      @robertthomas5906 หลายเดือนก่อน

      It's not big deal for governments. They have security plans in place and on that list is getting rid of things you don't need - such as a printing subsystem you'll never use. Every government place I've worked at they did the security and that was removed.
      If they don't care, sure it would be a problem and so would so many other things. Look under some keyboards. Do you see a password?

    • @imax9000
      @imax9000 หลายเดือนก่อน

      @@robertthomas5906 I'm struggling to think of a govt department that doesn't need to print a ton of paperwork every day

  • @dudeinanofficechair7662
    @dudeinanofficechair7662 หลายเดือนก่อน

    I think the 0 click nature is a bit of a gray area. The infection takes zero clicks. After that your machine is a land mine, but not a time bomb since the user might just never print. I'm not sure what the right words are for that.
    Would a different vulnerability be a zero click if something got injected that would run on next boot? Technically the user could just not ever reboot, but I would consider that a zero click exploit.

  • @JPs-q1o
    @JPs-q1o หลายเดือนก่อน +1

    foomatic-rip had it's purpose a decade and a half ago, I remember those days. Printer manufacturers, other than HP, were being little twits and not even sharing postscript and capabilities used by their printers with open source devs and users. foomatic-rip allowed you to use printers not officially supported without a PPD file by using the PPD from a similar printer and tweaking it on the fly with the aforementioned tool.

  • @ragectl
    @ragectl หลายเดือนก่อน

    I am waiting to see more on the Avahi bugs that were mentioned

  • @alignedfibers
    @alignedfibers หลายเดือนก่อน

    Local network access is itself probably the issue, should have the printers on a separate network, I think it is important to have nics that are capable of recieving two separate ip addresses or have a vpn, or other secure tunnel for things like secure printing and IOT.

  • @antonmakarenko3271
    @antonmakarenko3271 หลายเดือนก่อน

    I love his dedication to memes

  • @feedthechunk9836
    @feedthechunk9836 หลายเดือนก่อน

    Ed I wish you would have talked about how to restrict access to cupsd. You mentioned that it's open to everyone by default but not how to restrict to local traffic only.

  • @CtrlIQ
    @CtrlIQ หลายเดือนก่อน

    Nice overview!

  • @igorjunuqueira
    @igorjunuqueira หลายเดือนก่อน +6

    It's a serious exploit, but not a 9.9. A firewall can stop the attack. Does every distribution run cups by default?

    • @arthurmoore9488
      @arthurmoore9488 หลายเดือนก่อน

      Desktop distros yes. With the worst part being we want it there. This is what allows the "it just works" printing on Linux, and the printer appearing in the list part is expected behavior.

    • @paulie-g
      @paulie-g หลายเดือนก่อน

      Yes, but my Arch install wasn't listening on udp:631 and, obviously, any sane person has a deny-all rule in their *tables.

  • @AdeshAtole
    @AdeshAtole หลายเดือนก่อน

    Need Simone attitude in my life

  • @zxuiji
    @zxuiji หลายเดือนก่อน

    There's a simple solution to limiting foomatic-rip, store locally scripts that are known. If a submitted script does not match one of them then it's straight up ignored and the "printer" is told NO.

  • @asificam1
    @asificam1 หลายเดือนก่อน

    Really wish there was a way to make future printers more or less universal or at least with a universal mode like if they all accepted some basic image or vector format and then all new printers would not need as much backwards compatibility to just do basic printing. Would be amazing if there were some form of human readable language that printers could support, something like LaTeX. Just something that does not require the user's machine to run some arbitrary code that is different for each printer, like a universal printer language.

  • @VictorOrdu
    @VictorOrdu หลายเดือนก่อน

    This is interesting - both the computing and the human dynamics 😂

  • @kurt7020
    @kurt7020 หลายเดือนก่อน +1

    CUPS exploit. Not a linux exploit.
    If I understand correctly, it would work the same on any *BSD flavor. (After you install CUPS and run it - and expose the system directly to an untrusted network, etc.)

  • @yeetdatcodeboi
    @yeetdatcodeboi หลายเดือนก่อน

    An actually useful attack vector utilizing this "feature" would be data smuggling from inside a company to outside of said company. A machine that normally does send print jobs starting to send a few more per day might not even get an "huh, that's strange" from most companies under paid/skilled IT personnel. Gain access to that machine just long enough to install your faux printer, a piece of code that simply sends a duplicate of every print job to a remote "printer" that is simply saving the output of that print to a file(like print to PDF). As long as the user never sees any interruption of their normal tasks they may never know they are an assailant data smuggler. The IT persons may not realize for a while, or ever, because the user is printing to a printer they installed and gave permission to.

  • @adrian_sp6def
    @adrian_sp6def หลายเดือนก่อน

    I was waiting for that!

  • @JB-fh1bb
    @JB-fh1bb หลายเดือนก่อน +1

    CUPs is from a time when finding the phone number for a system gave you full access to it

  • @__christopher__
    @__christopher__ หลายเดือนก่อน

    I could imagine that the vulnerability could be exploited in networks that provide centralised printing. You can print arbitrary files there by design and to allow this, port 631 has to be open. So you have all the ingredients to run arbitrary code on the print server.

    • @Knirin
      @Knirin หลายเดือนก่อน

      CUPS actually has a decent amount of internal privilege management ability. You can allow printing by anyone but only allow printer setup by authorized users. CUPS had advertise myself but ignore other adverts filtering at one point as well. It may be disabled by default now.

  • @argyllsampson8663
    @argyllsampson8663 หลายเดือนก่อน

    In Linux mint I think if you turn off remote printer management in the settings, it turns off thus bug as well.

  • @orbatos
    @orbatos หลายเดือนก่อน

    First, I'm surprised you didn't know about this, it's how CUPS works. Even in the early 00's preventing CUPS from talking to the internet at all was standard practice, why that is no longer done is a better question. As for foomatic, sandboxing printer services has been an active discussion for ages as you've noticed. Arbitrary scripting is unfortunately still used with many types of printers (usually industrial, thermal, etc.).

  • @snooks5607
    @snooks5607 หลายเดือนก่อน +132

    stop clickbaiting cvss scores, they're meaningless without the context of what the software is and who the user is. it's not a damn richter scale

    • @tmzilla
      @tmzilla หลายเดือนก่อน +9

      Not even the richter scale is the what you think the richter scale is

    • @robertthomas5906
      @robertthomas5906 หลายเดือนก่อน +14

      It's worse - it's a manager's scale. We know about managers.
      OMG, It's a 9.9 out of 10! Almost as bad as it can be! Panic, run over the women and children! We're staying late to fix this! We'll buy Chinese Food and a couple Pizzas. Call home, you're staying late.
      Only to find out you're probably not even running cups. If you are it's set to localhost. Even if they get through they can only define a printer - which someone would have to use to exploit. So not some attacker could do this. They'd need help or be within the organization.
      I manage a bunch of RHEL, Fedora, and some other machines. A couple of them had cups running. Localhost only. So it's probably a 5.0 - 7.1. Congrats on finding the bug. It needs attention. Don't lose sleep over it.

    • @felixjohnson3874
      @felixjohnson3874 หลายเดือนก่อน +7

      I mean, that is *_literally_* it's point. Is it misused? Absolutely, but it's entire job is to give a score for how bad it is.

    • @felixjohnson3874
      @felixjohnson3874 หลายเดือนก่อน +1

      ​@@robertthomas5906who the fuck has CUPS set to localhost? Do you mean LAN? "Localhost" means it is hosted lically, i.e. on the same machine, but basically every printer in the past 1.5 decades has default network printing, and I can't recall a distro ever not having that work.
      So the requirements are, 1 : be on the same network as a target, 2 : name your "printer" "Save to PDF", 3 : profit

    • @ragectl
      @ragectl หลายเดือนก่อน +4

      It's not clickbait. It's technical opinion difference on how stupid simple this exploit is

  • @Elesario
    @Elesario หลายเดือนก่อน

    So one key thing to note it seems is that they already need to be in your network for this to be done. So risky for public networks, not as bad if you've got your own private wifi. Although considering the last video was a router exploit issue, maybe shouldn't be too complacent.

  • @LocalTrashyt
    @LocalTrashyt หลายเดือนก่อน

    You should make a tutorial on how to make a boot loader in rust with inline assembly(asm! macro)

  • @nonono9700
    @nonono9700 หลายเดือนก่อน

    I thought this was your second channel until i realized you just changed the channel icon 😅

  • @karlosdajackal
    @karlosdajackal หลายเดือนก่อน

    The affected version is 7 years old 2.0.1 released 2016. Ubuntu still ships it in a recent LTS...

  • @kj4derEchte
    @kj4derEchte หลายเดือนก่อน +1

    The thing ist, that an Linux 9 CVE Sounds Like a doomsday Szenario, but it does not if Servers (WHO are behind firewalls and never Print) are Not affected 😅

  • @JohnbelMahautiere
    @JohnbelMahautiere หลายเดือนก่อน

    Thank you for the instrument

  • @erintyres3609
    @erintyres3609 หลายเดือนก่อน

    10:42 The user has to print something using the printer definition that was created by the attacker. However, if the attacker knew the name of the existing printer definition, the user would not notice anything out of the ordinary.

  • @drtechno-v3e
    @drtechno-v3e 7 วันที่ผ่านมา

    CUPS is the generic print system. I purposely uninstall it. Since I use HP printers, I use HP Linux Imaging and Printer system (HPLIP) and foomatic is not installed either.

  • @kuhluhOG
    @kuhluhOG หลายเดือนก่อน +9

    As far as I understand CUPS, shouldn't you be able to trigger a print job to a specific printer yourself if you can reach port 631?

    • @fomxgorl
      @fomxgorl หลายเดือนก่อน +2

      iirc, it should ask for your login when you connect. it's been a while, so could be wrong

  • @berndeckenfels
    @berndeckenfels หลายเดือนก่อน

    Odd that the distributions not firewall-zone the port to local network 12:20 you sure it’s reachable by default? Did you turn your host firewall off?

  • @mgeb101
    @mgeb101 หลายเดือนก่อน

    you seem to forget that if you can connect to cups you can print and call the hook via a printjob you installed beforehand yourself...
    so actually, it's zero click...

    • @gebler
      @gebler หลายเดือนก่อน +1

      Not so sure about that. I believe the the main cups service is only accessible from the local machine by default, and that you would need access to it to do the actual printing triggering the command planted via cups-browsed. In contrast, cups-browsed is by default accessible by the entire network.