Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Home/CyberSecurity News/CUPS Vulnerability: Remote Code Execution as Root User
CyberSecurity News

CUPS Vulnerability: Remote Code Execution as Root User

A critical vulnerability chain in the Common Unix Printing System (CUPS) allows unauthenticated remote attackers to execute arbitrary malicious code with root system privileges. Security researcher...

David kimber
David kimber
April 8, 2026 2 Min Read
4 0

A critical vulnerability chain in the Common Unix Printing System (CUPS) allows unauthenticated remote attackers to execute arbitrary malicious code with root system privileges.

Security researcher Asim Viladi Oglu Manizada and his team discovered two zero-day flaws, officially tracked as CVE-2026-34980 and CVE-2026-34990, that affect CUPS versions 2.4.16 and older.

The sophisticated attack chain escalates a network intrusion into a complete system takeover by exploiting legacy print queues and manipulating localhost authentication mechanisms.

Bypassing Authentication with Legacy Queues

The first stage of the attack exploits CVE-2026-34980, targeting the default policy of the CUPS server, which accepts anonymous print jobs when a shared PostScript queue is exposed over a network.

By sending a maliciously crafted print request to this queue, a remote attacker can bypass the authentication layer and manipulate the internal queue configuration.

The vulnerability stems from a parsing bug where embedded newline characters in job attributes survive the system’s escaping process, allowing attackers to smuggle malicious commands into trusted scheduler control records.

Injecting a malicious filter entry into the PostScript Printer Description file grants the attacker remote code execution capabilities as the unprivileged “lp” service user.

Once initial access is achieved, the threat actor leverages the second vulnerability, CVE-2026-34990, to escalate privileges from the compromised “lp” user to full root access.

The default policy allows any low-privilege account to command the CUPS service to create a temporary local printer on the localhost interface without administrative approval.

By setting up a malicious fake printer listener, the attacker intercepts the setup process and coerces the CUPS daemon into authenticating with a reusable local authorization token.

Using this stolen admin token, the attacker exploits a race condition to bypass normal device URI restrictions, converting the temporary printer into a persistent queue pointing directly to a sensitive system file path, resulting in an arbitrary root file overwrite.

As of early April 2026, there are no official software patches available to resolve these vulnerabilities.

However, the initial remote code execution flaw requires the deliberate configuration choice of exposing a shared PostScript queue over the network.

To mitigate this threat, administrators should disable shared legacy queues, limit network exposure of the CUPS daemon, or enforce strict authentication for all print job submissions, as highlighted by heyitsas.

Operating the CUPS service under robust mandatory access control systems like AppArmor or SELinux can also limit the blast radius by preventing compromised processes from modifying critical files outside their safe environments.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerabilityzero-day

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Fiber Optic Cables: Hidden Microphones Secretly Spy on

Next Post

Claude Uncovers 13-Year-Old RCE Flaw in Apache ActiveMQ in Just 10

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Palo Alto Firewall Zero-Day RCE Act Networks Vulnerability
May 7, 2026
Critical Redis Flaws Enable Remote Code Execution Attacks
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us