Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-34980

CVE-2026-34980: OpenPrinting CUPS Auth Bypass Vulnerability

CVE-2026-34980 is an authentication bypass flaw in OpenPrinting CUPS that allows unauthenticated attackers to execute arbitrary binaries via malicious print jobs. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: April 10, 2026

CVE-2026-34980 Overview

A critical input validation vulnerability has been identified in OpenPrinting CUPS, the widely-used open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a network-exposed cupsd with a shared target queue allows an unauthorized client to send a Print-Job to a shared PostScript queue without authentication. The server accepts a page-border value supplied as textWithoutLanguage, preserves an embedded newline through option escaping and reparse, and then reparses the resulting second-line PPD text as a trusted scheduler control record. A follow-up raw print job can therefore make the server execute an attacker-chosen existing binary such as /usr/bin/vim as the lp user.

Critical Impact

Unauthenticated attackers on adjacent networks can exploit improper input validation to execute arbitrary existing binaries on vulnerable CUPS servers, potentially leading to system compromise.

Affected Products

  • OpenPrinting CUPS version 2.4.16 and prior
  • Linux and Unix-like operating systems running vulnerable CUPS versions
  • Systems with network-exposed cupsd and shared PostScript print queues

Discovery Timeline

  • 2026-04-03 - CVE CVE-2026-34980 published to NVD
  • 2026-04-07 - Last updated in NVD database

Technical Details for CVE-2026-34980

Vulnerability Analysis

This vulnerability stems from improper input validation (CWE-20) in the CUPS print job processing mechanism. When a network-exposed CUPS daemon is configured with shared print queues, it fails to properly sanitize the page-border option value before processing it through the PPD (PostScript Printer Description) parsing logic.

The vulnerability specifically exploits the way CUPS handles textWithoutLanguage values in print job submissions. An attacker can craft a malicious page-border value containing embedded newline characters. These newlines survive the option escaping and reparsing stages, allowing the second line to be interpreted as a trusted scheduler control record rather than user-supplied data. This parser confusion ultimately enables the attacker to influence the execution of system binaries under the context of the lp user account.

The attack requires adjacent network access, meaning the attacker must be on the same network segment as the vulnerable CUPS server. No authentication is required to exploit this vulnerability, making it particularly dangerous in environments with network-exposed print services.

Root Cause

The root cause is improper input validation in the CUPS print job handler. The vulnerability exists because:

  1. The page-border parameter accepts textWithoutLanguage values without adequate sanitization
  2. Embedded newline characters are preserved through the option escaping mechanism
  3. The PPD parser treats second-line content as trusted scheduler control records
  4. No authentication is required for Print-Job submissions to shared queues

This combination of design flaws allows untrusted input to cross a trust boundary and influence scheduler behavior.

Attack Vector

The attack follows this exploitation path:

  1. Attacker identifies a network-exposed CUPS daemon with shared PostScript print queues
  2. Attacker crafts a malicious Print-Job request with a specially formatted page-border value containing embedded newline characters
  3. The CUPS server accepts the job without authentication
  4. During processing, the newline causes the parser to interpret attacker-controlled data as a scheduler control record
  5. Attacker sends a follow-up raw print job that triggers execution of an existing system binary (e.g., /usr/bin/vim)
  6. The binary executes with lp user privileges

The vulnerability manifests in the boundary generation function and PPD parsing logic. For detailed technical information, see the GitHub Security Advisory.

Detection Methods for CVE-2026-34980

Indicators of Compromise

  • Unexpected Print-Job submissions to shared PostScript queues from unknown or unauthorized network hosts
  • Anomalous page-border option values containing newline characters or unusual formatting in CUPS logs
  • Processes spawned by the lp user that are not typical print-related binaries
  • Increased network traffic to CUPS services (typically port 631) from adjacent network segments

Detection Strategies

  • Monitor CUPS access logs (/var/log/cups/access_log) for unauthenticated Print-Job submissions from unexpected sources
  • Implement network intrusion detection rules to identify malformed IPP (Internet Printing Protocol) requests containing embedded newlines in option values
  • Deploy endpoint detection to alert on unusual process execution chains originating from the cupsd service
  • Review audit logs for binaries executed under the lp user context that are outside normal print operations

Monitoring Recommendations

  • Enable verbose logging in CUPS configuration to capture detailed job submission parameters
  • Configure network monitoring to alert on IPP traffic from unauthorized network segments
  • Implement process monitoring for the lp user account to detect execution of non-print-related binaries
  • Use SentinelOne Singularity platform to detect anomalous process behavior associated with print services

How to Mitigate CVE-2026-34980

Immediate Actions Required

  • Restrict network access to CUPS services using firewall rules to allow only trusted hosts
  • Disable shared PostScript print queues if not required for operations
  • Enable authentication requirements for all print job submissions where possible
  • Audit current CUPS configurations for network-exposed services with shared queues

Patch Information

At time of publication, there are no publicly available patches for this vulnerability. Organizations should monitor the GitHub Security Advisory for patch availability and update information from the OpenPrinting project.

Workarounds

  • Implement network segmentation to restrict adjacent network access to CUPS servers
  • Configure cupsd to require authentication for all print job submissions by modifying /etc/cups/cupsd.conf
  • Disable network sharing of print queues if remote printing is not essential
  • Use host-based firewall rules to limit IPP connections to explicitly authorized clients only
bash
# Configuration example - Restrict CUPS to localhost only
# Edit /etc/cups/cupsd.conf
Listen localhost:631
# Or bind to specific internal interface only
# Listen 192.168.1.100:631

# Require authentication for printing
<Policy default>
  <Limit Send-Document Send-URI Hold-Job Release-Job Restart-Job Purge-Jobs Set-Job-Attributes Create-Job-Subscription Renew-Subscription Cancel-Subscription Get-Notifications Reprocess-Job Cancel-Current-Job Suspend-Current-Job Resume-Job Cancel-My-Jobs Close-Job CUPS-Move-Job CUPS-Get-Document>
    AuthType Default
    Require user @SYSTEM
    Order deny,allow
  </Limit>
</Policy>

# Restart CUPS service after changes
sudo systemctl restart cups

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechOpenprinting Cups

  • SeverityMEDIUM

  • CVSS Score6.1

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-20
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2025-58060: OpenPrinting CUPS Auth Bypass Vulnerability

  • CVE-2024-35235: OpenPrinting CUPS RCE Vulnerability

  • CVE-2023-32324: OpenPrinting CUPS DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English