{"id":38491,"date":"2025-06-27T15:57:48","date_gmt":"2025-06-27T13:57:48","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=38491"},"modified":"2025-06-27T16:07:14","modified_gmt":"2025-06-27T14:07:14","slug":"vulnerabilities-in-689-brother-and-other-printer-models-june-2025","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2025\/06\/27\/vulnerabilities-in-689-brother-and-other-printer-models-june-2025\/","title":{"rendered":"Vulnerabilities in 689 Brother and other printer models (June 2025)"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2025\/06\/27\/sicherheitsluecken-in-689-brother-und-anderen-druckermodellen-juni-2024\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Security researchers from Rapid 7 have looked closer at various multi feature printers for vulnerabilities. They found them in the firmware of 689 Brother printer models. However, some printers from other manufacturers are also vulnerable.<\/p>\n<p><!--more--><\/p>\n<h2>Security analysis by Rapid 7<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg05.met.vgwort.de\/na\/6de9e87e7173424f9d3d251f68f398c2\" alt=\"\" width=\"1\" height=\"1\" \/>Security researchers from Rapid 7 wanted to find out how secure various printers are. In a comprehensive analysis, they carried out a zero-day research project on multifunction printers (MFPs). Primarily models from the manufacturer Brother were examined, but several other manufacturers were also scrutinized.<\/p>\n<table>\n<thead>\n<tr class=\"border-t border-gray-200\">\n<th class=\"px-4 py-2 text-gray-900 border border-gray-400 align-top\">CVE<\/th>\n<th class=\"px-4 py-2 text-gray-900 border border-gray-400 align-top\">Description<\/th>\n<th class=\"px-4 py-2 text-gray-900 border border-gray-400 align-top\">Affected Service<\/th>\n<th class=\"px-4 py-2 text-gray-900 border border-gray-400 align-top\">CVSS<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr class=\"border-t border-gray-200\">\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51977\" target=\"_blank\" rel=\"noopener\">CVE-2024-51977<\/a><\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">An unauthenticated attacker can leak sensitive information.<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">HTTP (Port 80), HTTPS (Port 443), IPP (Port 631)<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.first.org\/cvss\/calculator\/3.0#CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:N\/A:N\" target=\"_blank\" rel=\"noopener\">5.3 (Medium)<\/a><\/td>\n<\/tr>\n<tr class=\"border-t border-gray-200\">\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51978\" target=\"_blank\" rel=\"noopener\">CVE-2024-51978<\/a><\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">An unauthenticated attacker can generate the device's default administrator password.<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">HTTP (Port 80), HTTPS (Port 443), IPP (Port 631)<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.first.org\/cvss\/calculator\/3.0#CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener\">9.8 (Critical)<\/a><\/td>\n<\/tr>\n<tr class=\"border-t border-gray-200\">\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51979\" target=\"_blank\" rel=\"noopener\">CVE-2024-51979<\/a><\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">An authenticated attacker can trigger a stack based buffer overflow.<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">HTTP (Port 80), HTTPS (Port 443), IPP (Port 631)<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.first.org\/cvss\/calculator\/3.0#CVSS:3.0\/AV:N\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener\">7.2 (High)<\/a><\/td>\n<\/tr>\n<tr class=\"border-t border-gray-200\">\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51980\" target=\"_blank\" rel=\"noopener\">CVE-2024-51980<\/a><\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">An unauthenticated attacker can force the device to open a TCP connection.<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">Web Services over HTTP (Port 80)<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.first.org\/cvss\/calculator\/3.0#CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:N\/A:N\" target=\"_blank\" rel=\"noopener\">5.3 (Medium)<\/a><\/td>\n<\/tr>\n<tr class=\"border-t border-gray-200\">\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51981\" target=\"_blank\" rel=\"noopener\">CVE-2024-51981<\/a><\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">An unauthenticated attacker can force the device to perform an arbitrary HTTP request.<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">Web Services over HTTP (Port 80)<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.first.org\/cvss\/calculator\/3.0#CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:N\/A:N\" target=\"_blank\" rel=\"noopener\">5.3 (Medium)<\/a><\/td>\n<\/tr>\n<tr class=\"border-t border-gray-200\">\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51982\" target=\"_blank\" rel=\"noopener\">CVE-2024-51982<\/a><\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">An unauthenticated attacker can crash the device.<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">PJL (Port 9100)<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.first.org\/cvss\/calculator\/3.0#CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H\" target=\"_blank\" rel=\"noopener\">7.5 (High)<\/a><\/td>\n<\/tr>\n<tr class=\"border-t border-gray-200\">\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51983\" target=\"_blank\" rel=\"noopener\">CVE-2024-51983<\/a><\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">An unauthenticated attacker can crash the device.<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">Web Services over HTTP (Port 80)<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.first.org\/cvss\/calculator\/3.0#CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H\" target=\"_blank\" rel=\"noopener\">7.5 (High)<\/a><\/td>\n<\/tr>\n<tr class=\"border-t border-gray-200\">\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51984\" target=\"_blank\" rel=\"noopener\">CVE-2024-51984<\/a><\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">An authenticated attacker can disclose the password of a configured external service.<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\">LDAP, FTP<\/td>\n<td class=\"px-4 py-2 text-sm text-gray-700 border border-gray-400 align-top\"><a href=\"https:\/\/www.first.org\/cvss\/calculator\/3.0#CVSS:3.0\/AV:N\/AC:L\/PR:H\/UI:N\/S:C\/C:H\/I:N\/A:N\" target=\"_blank\" rel=\"noopener\">6.8 (Medium)<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This investigation led to the discovery of 8 new vulnerabilities (see table above. Vulnerability CVE-2024-51977 allows a remote, unauthenticated attacker to sniff the serial number of the target device along with several other sensitive pieces of information. Knowledge of the serial number of a target device is required to exploit the authentication bypass vulnerability CVE-2024-51978.<\/p>\n<p>The authentication bypass vulnerability CVE-2024-51978 allows a remote, unauthenticated attacker to generate the default administrator password of the target device. The default password is generated during the manufacturing process by converting the device's unique serial number to the default password. CVE-2024-51977 allows an attacker to sniff a serial number via the HTTP, HTTPS and IPP services of the target device<\/p>\n<h2>Numerous printer models affected<\/h2>\n<p>Some or all of these vulnerabilities affect 689 models in Brother's range of printers, scanners and label printers. In addition are:<\/p>\n<ul>\n<li>46 printer models from FUJIFILM Business Innovation,<\/li>\n<li>5 printer models from Ricoh,<\/li>\n<li>2 printer models from Toshiba Tec Corporation, and<\/li>\n<li>6 models from Konica Minolta, Inc.<\/li>\n<\/ul>\n<p>are affected by some or all of these vulnerabilities. In total, 748 models from 5 vendors are affected.<\/p>\n<p>Rapid7, in collaboration with JPCERT\/CC, has been working with Brother for the past thirteen months to coordinate the disclosure of these vulnerabilities. The details were disclosed by Rapid 7 in the post <a href=\"https:\/\/www.rapid7.com\/blog\/post\/multiple-brother-devices-multiple-vulnerabilities-fixed\/\" target=\"_blank\" rel=\"noopener\">Multiple Brother Devices: Multiple Vulnerabilities (FIXED)<\/a> (noticed <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/brother-printer-bug-in-689-models-exposes-default-admin-passwords\/\" target=\"_blank\" rel=\"noopener\">here<\/a>). The following seven vulnerabilities have been closed by firmware updates from the manufacturers:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51977\" target=\"_blank\" rel=\"noopener\">CVE-2024-51977<\/a><\/li>\n<li><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51979\" target=\"_blank\" rel=\"noopener\">CVE-2024-51979<\/a><\/li>\n<li><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51980\" target=\"_blank\" rel=\"noopener\">CVE-2024-51980<\/a><\/li>\n<li><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51981\" target=\"_blank\" rel=\"noopener\">CVE-2024-51981<\/a><\/li>\n<li><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51982\" target=\"_blank\" rel=\"noopener\">CVE-2024-51982<\/a><\/li>\n<li><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51983\" target=\"_blank\" rel=\"noopener\">CVE-2024-51983<\/a><\/li>\n<li><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51984\" target=\"_blank\" rel=\"noopener\">CVE-2024-51984<\/a><\/li>\n<\/ul>\n<p>However, the vulnerability <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-51978\" target=\"_blank\" rel=\"noopener\">CVE-2024-51978<\/a> has not been addressed. The manufacturer has pointed out that this vulnerability in the firmware cannot be completely fixed and has instead provided a workaround in its security advisory. Users of the affected models should apply both the firmware updates provided by the manufacturer and the workarounds to address all 8 vulnerabilities. Further details can be found in the following manufacturer's notes:<\/p>\n<ul>\n<li><a href=\"https:\/\/support.brother.com\/g\/b\/link.aspx?prod=group2&amp;faqid=faq00100846_000\" target=\"_blank\" rel=\"noopener\">Brother Laser and Inkjet Printer Advisory<\/a><\/li>\n<li><a href=\"https:\/\/support.brother.com\/g\/b\/link.aspx?prod=group2&amp;faqid=faq00100848_000\" target=\"_blank\" rel=\"noopener\">Brother Document Scanner Advisory<\/a><\/li>\n<li><a href=\"https:\/\/support.brother.com\/g\/b\/link.aspx?prod=lmgroup1&amp;faqid=faqp00100620_000\" target=\"_blank\" rel=\"noopener\">Brother Label Printer Advisory<\/a><\/li>\n<li><a href=\"https:\/\/www.fujifilm.com\/fbglobal\/eng\/company\/news\/notice\/2025\/0625_announce.html\" target=\"_self\" rel=\"noopener\">FUJIFILM Business Innovation Advisory<\/a><\/li>\n<li><a href=\"https:\/\/www.ricoh.com\/products\/security\/vulnerabilities\/vul?id=ricoh-2025-000007\" target=\"_self\" rel=\"noopener\">Ricoh Advisory<\/a><\/li>\n<li><a href=\"https:\/\/www.toshibatec.com\/information\/20250625_02.html\" target=\"_self\" rel=\"noopener\">Toshiba Tec Corporation Advisory<\/a><\/li>\n<li><a href=\"https:\/\/www.konicaminolta.com\/global-en\/security\/advisory\/pdf\/km-2025-0001.pdf\" target=\"_self\" rel=\"noopener\">Konica Minolta, Inc. Advisory<\/a><\/li>\n<\/ul>\n<p>Further details can be found in the linked Rapid7 blog post.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Security researchers from Rapid 7 have looked closer at various multi feature printers for vulnerabilities. They found them in the firmware of 689 Brother printer models. However, some printers from other manufacturers are also vulnerable.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[448,580,1547,22],"tags":[68,415,69,195],"class_list":["post-38491","post","type-post","status-publish","format-standard","hentry","category-devices","category-security","category-software","category-update","tag-firmware","tag-printer","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/38491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=38491"}],"version-history":[{"count":3,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/38491\/revisions"}],"predecessor-version":[{"id":38494,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/38491\/revisions\/38494"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=38491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=38491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=38491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}