VYPR
Medium severity4.4NVD Advisory· Published Nov 15, 2024· Updated Apr 15, 2026

CVE-2024-51330

CVE-2024-51330

Description

An issue in UltiMaker Cura v.4.41 and 5.8.1 and before allows a local attacker to execute arbitrary code via Inter-process communication (IPC) mechanism between Cura application and CuraEngine processes, localhost network stack, printing settings and G-code processing and transmission components, Ultimaker 3D Printers.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

UltiMaker Cura versions 4.41, 5.8.1 and earlier allow local attackers to manipulate G-code via unencrypted inter-process communication, leading to arbitrary code execution.

Vulnerability

Description

An issue in UltiMaker Cura versions 4.41, 5.8.1 and before allows a local attacker to execute arbitrary code via an unencrypted inter-process communication (IPC) mechanism [1]. The Cura application communicates with CuraEngine (the slicing process) over localhost using the libArcus protocol on port 49674 [1]. This IPC carries a bidirectional flow of data essential to the 3D printing process, including mesh data (binary representation of the 3D model's geometry) and printing settings transmitted as plaintext [1].

Exploitation

The vulnerability can be exploited by a local attacker with access to the machine running Cura [1]. Because the IPC is unencrypted and occurs over the localhost network stack, an attacker can intercept or inject data into the communication channel. The printing settings, sent as plaintext, are easily modifiable in real-time [1]. The attacker could modify these settings or the G-code instructions that CuraEngine generates based on the mesh and settings, potentially altering printer behavior [1].

Impact

Successful exploitation allows a local attacker to execute arbitrary code on the system [description]. By tampering with the IPC data, the attacker could manipulate G-code sent to Ultimaker 3D Printers, leading to unintended printer actions or other malicious outcomes [1].

Mitigation

As of publication, no specific patch or security update is mentioned in the reference. Users should limit local access to systems running Cura and monitor IPC traffic on localhost. It is recommended to apply any future updates from UltiMaker that address this vulnerability.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Ultimaker/Curainferred2 versions
    <=5.8.1+ 1 more
    • (no CPE)range: <=5.8.1
    • (no CPE)range: <=4.41, <=5.8.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.