Use my new tool 'jugular' to do ultrafast scans of your internal networks (or the entire Internet?) for open (likely vulnerable) CUPS-browsed instances.
Many will be affected by the multiple CUPS vulnerabilities we learned about last week (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177) and this should help you map out what you have in your infrastructure.
It's for Linux only, as it's written for performance (direct UDP packet creation and sending). There's a compiled x64 Linux binary available, otherwise you can build it yourself.
The debacle about the entire CUPS thing is a mess. Of course getting root by installing a malicious printer is bad, but it does require the target to actually print something. I think the potential for weaponizing the parsing problems is worse though.
Let me know what you think, comments and input is welcome.
https://github.com/lkarlslund/jugular