vulnerability
Red Hat: CVE-2025-58060: cups: Authentication Bypass in CUPS Authorization Handling (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:N/C:P/I:C/A:C) | Sep 11, 2025 | Sep 12, 2025 | Sep 26, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:P/I:C/A:C)
Published
Sep 11, 2025
Added
Sep 12, 2025
Modified
Sep 26, 2025
Description
A flaw was found in CUPS, a widely used printing service on Linux and UNIX-like systems. The issue arises when authentication is configured to use a method other than Basic, but the attacker sends an HTTP request with a Basic authentication header. Due to improper validation in the cupsdAuthorize() function, the password is not checked. This vulnerability allows attackers to bypass authentication entirely, resulting in unauthorized access to administrative functions and system configuration.
Solutions
redhat-upgrade-cupsredhat-upgrade-cups-clientredhat-upgrade-cups-client-debuginforedhat-upgrade-cups-debuginforedhat-upgrade-cups-debugsourceredhat-upgrade-cups-develredhat-upgrade-cups-filesystemredhat-upgrade-cups-ipptoolredhat-upgrade-cups-ipptool-debuginforedhat-upgrade-cups-libsredhat-upgrade-cups-libs-debuginforedhat-upgrade-cups-lpdredhat-upgrade-cups-lpd-debuginforedhat-upgrade-cups-printerappredhat-upgrade-cups-printerapp-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.