• deadcade@lemmy.deadca.de
    link
    fedilink
    arrow-up
    8
    arrow-down
    2
    ·
    19 hours ago

    As far as I’m aware, the exploit requires someone to try printing using a malicious networked printer. It is a vulnerability, yes, but it affects essentially nobody. Who tries manually printing something on a server exposed to the internet?

    Although for local network access, like in a corporation using Linux on desktops, the vulnerability is an actual risk.

      • deadcade@lemmy.deadca.de
        link
        fedilink
        arrow-up
        2
        ·
        12 hours ago

        Even there, if the stars align (network access, cups being used), you still need to convince the user of the device to switch printer.

      • CodeGameEat@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        15 hours ago

        Ive worked with thermal printers used in POS, and usually they use a different protocol than notmal printing so you’re not using cups (basically you send “commands” with text and its position). But i am sure there are some exceptions…