This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ================================================= | |
| [1] CVE-2024-51330 --> Unencrypted Inter-Process Communication (IPC) Vulnerability - UltiMaker Cura | |
| ================================================= | |
| [Description] | |
| Ultimaker Cura employs unencrypted inter-process communication (IPC) over localhost between its main application and CuraEngine (the slicing process) | |
| using the libArcus protocol on port 49674. This communication involves a bidirectional flow of data essential to the 3D printing process. | |
| Initially, the Cura application sends two types of data to CuraEngine. First, it transmits the mesh data, which is a binary representation of the | |
| 3D model's geometry. While this data is in binary format and not easily interpretable or modifiable in real-time, it is crucial for the slicing process. |