heroui logo

Network Connection by Cups or Foomatic-rip Child

Elastic Detection Rules

View Source
Summary
This detection rule monitors for potential exploitation attempts of vulnerabilities in the Common UNIX Printing System (CUPS), specifically addressing CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177 that allow attackers to perform remote code execution through crafted IPP (Internet Printing Protocol) requests and manipulated UDP packets. The rule captures sequences where child processes of 'foomatic-rip' initiate network connections, indicating a possible exploit trigger of these vulnerabilities. Investigative actions include analyzing incoming network traffic on the designated print service ports and validating printer configurations for unauthorized changes. Recommendations for response include isolation of compromised hosts, further investigation into any additional potential breach indicators, and restoring printer configurations and system integrity post-exploitation.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1203
Created: 2024-09-27