Hundreds of brother printer models have found serious safety flaws that may allow the attackers to reach remotely tools that are still using the default password. Eight new weaknesses, one of which could not be decided by patches by firmware, 689 types of brother’s house and enterprise were discovered by printers. Security Company Rapid 7,
Fuzifilm, Toshiba, Rico and Konika Minolta also affect 59 printer models, but not every printer model is found on every vulnerability. If you own a brother printer, you can check See if your model is impressed here,
The most severe safety defect, tracked under CVE-2024-51978 in National Word DatabaseOne 9.8 “Critical” CVSS rating And the attackers allow the device’s default administrator to generate passwords if they know the serial number of the printer they are targeting. This allows the attackers to take advantage of the other seven weaknesses discovered by Rapid 7, including obtaining sensitive information, crashing the device, opening TCP connections, making arbitrary HTTP requests and highlighting passwords for connected network services.
While seven of these security defects can be decided Firmware update is detailed in Rapid 7 reportThe brother indicated to the company that the CVE-2024-51978 itself would not be completely removed in the firmware, “and will be fixed through changes in the manufacturing process for future versions of the affected printer model. For the current model, the brother recommends that the user change the default administrator password through its printer The web-based management menu of the device
Changing default manufacturing password is something we all should do when we take a new device home, and why these printers weaknesses are a good example that.