CVE-2026-34990 — OpenPrinting CUPS is an open source printing system for Linux and other…
Image via opengraph.githubassets.com
🚨 CVE-2026-34990 OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with a reusable Authorization: Local ...
Local print admin token disclosure using temporary printers
github.com
What This Means For You
- Affects Linux systems — review kernel and package updates.
- New vulnerability disclosed — verify if your stack is exposed.
- New tool or resource available — evaluate for your security workflow.
Related ATT&CK Techniques
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-34990 | Authentication Bypass | OpenPrinting CUPS versions 2.4.16 and prior. Local unprivileged user can coerce cupsd to authenticate to an attacker-controlled localhost IPP service with a reusable Authorization: Local ... token. |
| CVE-2026-34990 | Privilege Escalation | OpenPrinting CUPS versions 2.4.16 and prior. Exploiting the authentication bypass to use CUPS-Create-Local-Printer with printer-is-shared=true to persist a file:///... queue, leading to arbitrary root file overwrite and command execution. |
| CVE-2026-34990 | Path Traversal | OpenPrinting CUPS versions 2.4.16 and prior. The ability to persist a file:///... queue via CUPS-Create-Local-Printer can be used for arbitrary file writes. |
Source & Attribution
| Source Platform | Telegram |
| Channel | CVE Notify |
| Channel ID | 1129491012 |
| Message ID | 158208 |
| Published | April 06, 2026 at 22:26 UTC |
| Original Link | https://github.com/OpenPrinting/cups/security/advisories/... |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.
Found this interesting? Follow us to stay ahead.
Share