Skip to content

Millions of Brother printers found vulnerable to hacks

  • by
  • 2 min read

Security researchers have discovered a set of eight vulnerabilities that affect millions of enterprise and home printers from Brother around the world. If exploited, the vulnerabilities let a remote attacker take over the device and hamper its intended functionality.

The vulnerabilities were discovered by researchers at Rapid7. Their report claims that these vulnerabilities affect 689 printer, scanner, and label maker models from Brother. Some of these flaws also affect 46 Fujifilm Business Innovation, 5 Ricoh, 6 Konica Minolta, and 2 Toshiba printers.

Almost all of the vulnerabilities affect the HTTP and HTTPS ports on the device, with the most severe vulnerability, dubbed CVE-2024-51978, rated 9.8 on the CVSS scale. The vulnerabilities are as follows

VulnerabilityCVSS ScoreDescription
CVE-2024-519775.3Allows sensitive data leak
CVE-2024-519789.8Allows hackers to generate default administrator password
CVE-2024-519797.2Triggers a stack-based buffer overflow
CVE-2024-519805.3Forces the device to perform an arbitrary HTTP request
CVE-2024-519815.3Can crash the device
CVE-2024-519827.5Can crash the device
CVE-2024-519837.5Can crash the device
CVE-2024-519846.8Discloses the password of a configured external service

The most severe vulnerability of the bunch is CVE-2024-51978. If exploited correctly, it allows a remote attacker to bypass authentication on the target printer by generating the device’s default administrator password. It can also be chained with CVE-2024-51977 to obtain the device’s serial number, which can be used to generate the default admin password. Six of the vulnerabilities can be exploited without authentication as well, which significantly increases risk of exploitation.

The vulnerabilities were reported to Brother in 2024 via Japan’s JPCERT/CC, leading to advisories being issued by the company. Most of the flaws have already been patched in software updates. However, CVE-2024-51978 cannot be fully patched via software updates, leading to a new manufacturing process that ensures future devices aren’t vulnerable.

In the News: Apple and Android app stores found offering spyware

Yadullah Abidi

Yadullah Abidi

Yadullah is a Computer Science graduate who writes/edits/shoots/codes all things cybersecurity, gaming, and tech hardware. When he's not, he streams himself racing virtual cars. He's been writing and reporting on tech and cybersecurity with websites like Candid.Technology and MakeUseOf since 2018. You can contact him here: yadullahabidi@pm.me.

>