Query Details
// Finding internet facing device with CUPS // My feed was buzzing with CUPS disclosures (CVSS 9.9) this morning, and it’s only Friday! Time to bring out my DefenderXDR Exposure Management toolkit and cast this magical KQL spell to identify all internet-connected devices with CUPS for a swift search and rescue operation. // Attacking UNIX Systems via CUPS, Part I // Link: https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/ // DefenderXDR Exposure Management let InternetFacingDevices = ExposureGraphNodes | where NodeLabel == 'device' or (Categories has 'virtual_machine' and set_has_element(Categories, 'virtual_machine')) | where NodeProperties.rawData.isInternetFacing == true | project NodeName; DeviceTvmSoftwareInventory | where DeviceName has_any (InternetFacingDevices) | where SoftwareName has "cups" // Mitre ATT&CK Technique: T1518.001 - Software Discovery: Security Software Discovery
This KQL query is designed to identify internet-facing devices that have the CUPS (Common UNIX Printing System) software installed. Here's a simplified breakdown:
Identify Internet-Facing Devices:
Check for CUPS Installation:
Purpose:
Context:
Reference:
In essence, this query helps security teams quickly find and address potential vulnerabilities in their internet-facing devices that have CUPS installed.

Steven Lim
Released: September 27, 2024
Tables
Keywords
Operators