Palo Alto Networks Security Advisories / CVE-2024-47076

CVE-2024-47076 Informational: No Impact of CUPS Vulnerabilities on Palo Alto Networks Products


Informational

Description

The Palo Alto Networks Product Security Assurance team has evaluated CVE-2024-47076, CVE-2024-47177, CVE-2024-47175, and CVE-2024-47176 in the Common UNIX Printing System (CUPS) as they relate to our products.

Based on current information, Palo Alto Networks products and cloud services do not contain affected CUPS-related software packages and are not impacted by these issues.

CVESummary
CVE-2024-47076The listed products do not contain affected CUPS-related software packages and are not impacted by this issue.
CVE-2024-47177The listed products do not contain affected CUPS-related software packages and are not impacted by this issue.
CVE-2024-47175The listed products do not contain affected CUPS-related software packages and are not impacted by this issue.
CVE-2024-47176The listed products do not contain affected CUPS-related software packages and are not impacted by this issue.

Product Status

VersionsAffectedUnaffected
Cloud NGFW NoneAll
Cortex XDR NoneAll
Cortex XDR Agent NoneAll
Cortex XSIAM NoneAll
Cortex XSOAR NoneAll
GlobalProtect App NoneAll
PAN-OS NoneAll
Prisma Access NoneAll
Prisma Access Browser NoneAll
Prisma Cloud NoneAll
Prisma Cloud Compute NoneAll
Prisma SD-WAN NoneAll

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Solution

No software updates are required at this time.

Workarounds and Mitigations

Customers who decide to block CUPS traffic can create a Security policy rule (Policies > Security) that targets the "cups" application. Refer to the information about creating Security policy rules: https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/policy/security-policy/create-a-security-policy-rule

Acknowledgments

Palo Alto Networks thanks Simone Margaritelli (@evilsocket) for discovering and reporting this vulnerability.
Palo Alto Networks thanks CERT/CC for coordinating the disclosure of this vulnerability.

Timeline

Initial publication
© 2024 Palo Alto Networks, Inc. All rights reserved.