You have 0 free articles left this month.
Register for a free account to access unlimited free content.
Powered by MOMENTUM MEDIA
lawyers weekly logo

Powered by MOMENTUMMEDIA

For breaking news and daily updates, subscribe to our newsletter.
Advertisement

Ctrl+Panic: Rapid7 warns of serious vulnerabilities in hundreds of Brother printer models

Fujifilm, Ricoh, and Toshiba models were all impacted as well, with the worst flaw allowing a malicious actor to extract admin passwords.

Ctrl+Panic: Rapid7 warns of serious vulnerabilities in hundreds of Brother printer models
expand image

Security researchers, working with a major printer manufacturer, have uncovered a raft of new vulnerabilities in hundreds of printer models made by four different vendors.

Working with Brother and Japan’s JPCERT Coordination Center, researchers at Rapid7 were able to discover eight vulnerabilities across 689 models of Brother multifunction printers.

In addition, 46 Fujifilm Business Innovation devices, five Ricoh models, and two made by Toshiba Tec Corporation are subject to some or all of these vulnerabilities.

“The most serious of the findings is the authentication bypass CVE-2024-51978. A remote unauthenticated attacker can leak the target device’s serial number through one of several means, and in turn generate the target device’s default administrator password,” Rapid7 said in a 25 June blog post.

“This is due to the discovery of the default password generation procedure used by Brother devices. This procedure transforms a serial number into a default password. Affected devices have their default password set, based on each device’s unique serial number, during the manufacturing process.”

Unfortunately, this vulnerability cannot be addressed by a firmware update, since the issue is due in part to Brother’s manufacturing process. Brother will be initiating a new manufacturing process to produce printers without this flaw, and it has provided a workaround for older devices.

“Brother would like to thank Rapid7 for their efforts in discovering the issues,” a Brother spokesperson said.

Here’s a full list of the vulnerabilities recently disclosed:

  • CVE-2024-51977: An unauthenticated attacker can leak sensitive information. Impacts 457 models.
  • CVE-2024-51978: An unauthenticated attacker can generate the device’s default administrator password. Impacts 691 models.
  • CVE-2024-51979: An authenticated attacker can trigger a stack-based buffer overflow. Impacts 604 models.
  • CVE-2024-51980: An unauthenticated attacker can force the device to open a TCP connection. Impacts 707 models.
  • CVE-2024-51981: An unauthenticated attacker can force the device to perform an arbitrary HTTP request. Impacts 701 models.
  • CVE-2024-51982: An unauthenticated attacker can crash the device. Impacts 208 models.
  • CVE-2024-51983: An unauthenticated attacker can crash the device. Impacts 660 models.
  • CVE-2024-51984: An authenticated attacker can disclose the password of a configured external service. Impacts 684 models.

“Rapid7, acting as the CVE Numbering Authority (CNA) in this disclosure, has populated all eight CVE records with information for every known affected model,” Rapid7 said.

In addition, Brother has published three advisories regarding the disclosure:

Rapid7’s Stephen Fewer discovered the vulnerabilities during a zero-day research project based on Brother's MFC-L9570CDW device. Brother initially contacted Rapid7 regarding the vulnerabilities in May 2024. In July of the same year, JPCERT/CC got involved in the disclosure process on Brother’s behalf. Over the next 11 months, Rapid7, Brother, and JPCERT/CC worked together to remediate the issues and verify the fixes provided, with final confirmation of the fixes made in March 2025.

An updated list of models impacted by the vulnerabilities was provided to Rapid7 by JPCERT/CC on 2 June, with the final public disclosure made on 25 June – a date broadly agreed upon back in August 2024.

David Hollingworth

David Hollingworth

David Hollingworth has been writing about technology for over 20 years, and has worked for a range of print and online titles in his career. He is enjoying getting to grips with cyber security, especially when it lets him talk about Lego.

You need to be a member to post comments. Become a member for free today!

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.