EulerOS 2.0 SP13 : cups (EulerOS-SA-2025-2497)

high Nessus Plugin ID 278469

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the cups package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, when the `AuthType` is set to anything but `Basic`, if the request contains an `Authorization: Basic ...` header, the password is not checked. This results in authentication bypass.
Any configuration that allows an `AuthType` that is not `Basic` is affected. Version 2.4.13 fixes the issue.(CVE-2025-58060)

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe deserialization and validation of printer attributes causes null dereference in the libcups library. This is a remote DoS vulnerability available in local subnet in default configurations. It can cause the cups cups-browsed to crash, on all the machines in local network who are listening for printers (so by default for all regular linux machines). On systems where the vulnerability CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) was not fixed, and the firewall on the machine does not reject incoming communication to IPP port, and the machine is set to be available to public internet, attack vector 'Network' is possible. The current versions of CUPS and cups- browsed projects have the attack vector 'Adjacent' in their default configurations. Version 2.4.13 contains a patch for CVE-2025-58364.(CVE-2025-58364)

Tenable has extracted the preceding description block directly from the EulerOS cups security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected cups packages.

See Also

http://www.nessus.org/u?3677840e

Plugin Details

Severity: High

ID: 278469

File Name: EulerOS_SA-2025-2497.nasl

Version: 1.1

Type: local

Published: 12/11/2025

Updated: 12/11/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:C/A:C

CVSS Score Source: CVE-2025-58060

CVSS v3

Risk Factor: High

Base Score: 8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:cups-libs, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/11/2025

Vulnerability Publication Date: 9/11/2025

Reference Information

CVE: CVE-2025-58060, CVE-2025-58364