NeXT Printer Privilege Escalation

HIGH (7.2) Patch Available Patch Patch

Threat Intelligence

Low Risk
EPSS Score: 0.39% chance of exploitation (percentile: 60%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

NeXT 1.0a and 1.0 is a Unix operating system that allows local users to gain privileges via a combination of the npd program and weak directory permissions. This vulnerability could potentially lead to unauthorized access to sensitive data or system configuration.

Am I affected?

You're affected if you use NeXT 1.0a or 1.0 with publicly accessible printers. To check, run npd -l on your system (this command may not be available in all versions).

Note: This is a niche software, and if you don't recognize the name, you're probably not affected.

Version info: Not specified in the advisory.

Affected Products

NeXT / NeXT 1.0a/1.0

How to fix

Download the patch from http://www.cert.org/advisories/CA-1990-06.html.
- Apply the patch manually or use your system's package manager to upgrade to a patched version.