Navigation
Search
|
Brother Printer Bug In 689 Models Exposes Millions To Hacking
Friday June 27, 2025. 03:00 PM , from Slashdot
![]() The most serious of the flaws, tracked as CVE-2024-51978 and with a severity rating of 'critical', can allow a remote and unauthenticated attacker to bypass authentication by obtaining the device's default administrator password. CVE-2024-51978 can be chained with an information disclosure vulnerability tracked as CVE-2024-51977, which can be exploited to obtain a device's serial number. This serial number is needed to generate the default admin password. 'This is due to the discovery of the default password generation procedure used by Brother devices,' Rapid7 explained. 'This procedure transforms a serial number into a default password. Affected devices have their default password set, based on each device's unique serial number, during the manufacturing process.' Having the admin password enables an attacker to reconfigure the device or abuse functionality intended for authenticated users. The remaining vulnerabilities, which have severity ratings of 'medium' and 'high', can be exploited for DoS attacks, forcing the printer to open a TCP connection, obtain the password of a configured external service, trigger a stack overflow, and perform arbitrary HTTP requests. Six of the eight vulnerabilities found by Rapid7 can be exploited without authentication. Brother has patched most of the flaws, but CVE-2024-51978 requires a new manufacturing process to fully resolve, which will apply only to future devices. Read more of this story at Slashdot.
https://hardware.slashdot.org/story/25/06/26/2351234/brother-printer-bug-in-689-models-exposes-milli...
Related News |
25 sources
Current Date
Jun, Sat 28 - 05:13 CEST
|