Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-41079
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-24 Apr, 2026 | 17:16
Updated At-27 Apr, 2026 | 13:40

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to 2.4.17, a network-adjacent attacker can send a crafted SNMP response to the CUPS SNMP backend that causes an out-of-bounds read of up to 176 bytes past a stack buffer. The leaked memory is converted from UTF-16 to UTF-8 and stored as printer supply description strings, which are subsequently visible to authenticated users via IPP Get-Printer-Attributes responses and the CUPS web interface. This vulnerability is fixed in 2.4.17.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Primary3.15.4MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
Type: Secondary
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
CPE Matches

openprinting
openprinting
>>cups>>Versions before 2.4.17(exclusive)
cpe:2.3:a:openprinting:cups:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-125Secondarysecurity-advisories@github.com
CWE-200Secondarysecurity-advisories@github.com
CWE ID: CWE-125
Type: Secondary
Source: security-advisories@github.com
CWE ID: CWE-200
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/OpenPrinting/cups/commit/b7c2525a885f528d243c3a92197ca99609b3f080security-advisories@github.com
Patch
https://github.com/OpenPrinting/cups/commit/d7fe0f521ff3b24676511e747b058362b9a20737security-advisories@github.com
Patch
https://github.com/OpenPrinting/cups/security/advisories/GHSA-6wpw-g8g6-wvrvsecurity-advisories@github.com
Exploit
Mitigation
Patch
Vendor Advisory
https://github.com/OpenPrinting/cups/security/advisories/GHSA-6wpw-g8g6-wvrv134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit
Mitigation
Patch
Vendor Advisory
Hyperlink: https://github.com/OpenPrinting/cups/commit/b7c2525a885f528d243c3a92197ca99609b3f080
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/OpenPrinting/cups/commit/d7fe0f521ff3b24676511e747b058362b9a20737
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/OpenPrinting/cups/security/advisories/GHSA-6wpw-g8g6-wvrv
Source: security-advisories@github.com
Resource:
Exploit
Mitigation
Patch
Vendor Advisory
Hyperlink: https://github.com/OpenPrinting/cups/security/advisories/GHSA-6wpw-g8g6-wvrv
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Exploit
Mitigation
Patch
Vendor Advisory
Change History
0Changes found

Details not found