CVE-2026-34990 — OpenPrinting CUPS is an open source printing system for Linux and other…

CVE-2026-34990 — OpenPrinting CUPS is an open source printing system for Linux and other…

Image via opengraph.githubassets.com

🚨 CVE-2026-34990 OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with a reusable Authorization: Local ...

What This Means For You

  • Affects Linux systems — review kernel and package updates.
  • New vulnerability disclosed — verify if your stack is exposed.
  • New tool or resource available — evaluate for your security workflow.

Related ATT&CK Techniques

Indicators of Compromise

IDTypeIndicator
CVE-2026-34990 Authentication Bypass OpenPrinting CUPS versions 2.4.16 and prior. Local unprivileged user can coerce cupsd to authenticate to an attacker-controlled localhost IPP service with a reusable Authorization: Local ... token.
CVE-2026-34990 Privilege Escalation OpenPrinting CUPS versions 2.4.16 and prior. Exploiting the authentication bypass to use CUPS-Create-Local-Printer with printer-is-shared=true to persist a file:///... queue, leading to arbitrary root file overwrite and command execution.
CVE-2026-34990 Path Traversal OpenPrinting CUPS versions 2.4.16 and prior. The ability to persist a file:///... queue via CUPS-Create-Local-Printer can be used for arbitrary file writes.
🔎
Turn this CVE into SIEM detection coverage Generate detection rules for Splunk, Sentinel, QRadar & Elastic — straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot →
Source & Attribution
Source PlatformTelegram
ChannelCVE Notify
PublishedApril 06, 2026 at 22:26 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

Ubiquiti Patches Three Max Severity UniFi OS Vulnerabilities

Ubiquiti has rolled out critical security updates addressing three maximum severity vulnerabilities in UniFi OS. BleepingComputer reports these flaws, tracked as CVE-2023-48092, CVE-2023-48093, and CVE-2023-48094,...

threat-inteldata-breachmalwarevulnerabilitytools
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 1 Sigma

Megalodon GitHub Attack: 5,561 Repos Hit with Malicious CI/CD Workflows

The Hacker News reports a new automated campaign, dubbed Megalodon, that injected 5,718 malicious commits into 5,561 GitHub repositories within a mere six-hour window. This...

threat-intelvulnerabilitytools
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma

WordPress Ditty Plugin: Authorization Bypass Exposes Non-Public Content

CVE-2026-9011 — The Ditty – Responsive News Tickers, Sliders, and Lists plugin for WordPress is vulnerable to authorization bypass in all versions up to, and...

vulnerabilityCVEhigh-severitycwe-862
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 3 IOCs