• ipp0@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    43
    arrow-down
    2
    ·
    3 days ago

    This attack must be run locally. The attacker must already have user access. They can then escalate privileges using this. Meaning your box must already be compromised for this to work. Still serious, but no need to panic in most cases.

      • ipp0@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        2 days ago

        Do you have a source for how often it happens or is this conjecture? I guess this would most often happen through supply chain attacks or physical access, the first not being all that common in my understanding and the latter not being a typical threat model for a home computer. But if you have a source explaining what actually happens, I would love to read it.

          • ipp0@sopuli.xyz
            link
            fedilink
            English
            arrow-up
            1
            ·
            7 hours ago

            These are from 2024 (which means your box likely has none of these in 2026), and “the attacker has to trick a user into printing from a malicious printer server on their local network that suddenly appears on their machine” which is quite unlikely for a regular home pc. The attacker would require access to your network which would likely mean they’re inside your house so you have other problems besides privilege escalation.