Millions of Brother Printers Contain Vulnerable Exploits

0
12χλμ.

Brother makes some solid, reliable printers. Indeed, for several years running, The Verge named it the best printer you should buy. Unfortunately, the company’s devices appear to be riddled with new zero-day bugs that could allow a savvy cybercriminal to hijack them.

The vulnerabilities were discovered by cybersecurity firm Rapid7, which published a blog about the bugs last week. The blog explains that, after some research, Rapid7’s cyber pros came across a total of eight new zero-day vulnerabilities in the machines. The vulnerabilities are all different, though there is one that is pretty bad. CVE-2024-51978 is an authentication bypass vulnerability that could allow a hacker to nab the printer’s password. Researchers break it down like so:

A remote unauthenticated attacker can leak the target device’s serial number through one of several means, and in turn generate the target device’s default administrator password. This is due to the discovery of the default password generation procedure used by Brother devices. This procedure transforms a serial number into a default password. Affected devices have their default password set, based on each device’s unique serial number, during the manufacturing process. Brother has indicated that this vulnerability cannot be fully remediated in firmware, and has required a change to the manufacturing process of all affected models.

Researchers originally contacted Brother Industries last year, and the printing company and security researchers have been in touch since then, working to mitigate the issues. The bugs are also impacting several other printer brands, including FujifilmRicohToshiba, and Konica Minolta, according to researchers.  

Dark Reading notes that millions of devices appear to be impacted. Luckily, researchers note that there is no evidence that the bugs are being exploited in the wild. Brother has also issued patches for the vulnerabilities.

In addition to installing patches, users are also encouraged to change their default administrator password. That should stop the bad bug, CVE-2024-51978, which would have allowed an intruder to hijack the machine. If you don’t do that, researchers warn that an attacker could “use this default administrator password to either reconfigure the target device, or access functionality only intended for authenticated users.”

Gizmodo reached out to Brother Industries for more information. In a statement shared Wednesday, the company said: “Brother would like to thank Rapid7 for their efforts in discovering the issues. We have informed our customers about the mitigation on our website.”

Like
Love
Haha
3
Αναζήτηση
Κατηγορίες
Διαβάζω περισσότερα
News
4 việc này phụ nữ hay làm rất dễ mắc các bệnh hiểm nghèo, nhiều người giật mình phát hiện bản thân có cả 4
1. Kìm nén cảm xúc, trầm cảm kéo dài Cảm xúc là một...
από PlatinumPainter 2025-06-29 03:53:04 0 10χλμ.
Food
This Lentil and Egg Scramble Has Been Saving My Mornings
Alright, listen up! Tired of the same old breakfast routine? This Lentil and Egg Scramble is your...
από bailey_gerson_fXAl 2025-07-14 20:06:08 0 7χλμ.
CỘNG ĐỒNG
Trong khi chơi game, nữ game thủ nhận tin nhắn lừa đảo, suýt mất cả tỷ đồng.
Trong thế giới game online, những câu chuyện lừa đảo ngày càng trở nên tinh vi và...
από sophiababy1344 2025-06-20 10:21:08 0 9χλμ.
News
Loài hoa rực rỡ như 'pháo hoa đêm xuân', nở 120 ngày mỗi năm, trồng một cây còn hơn 10 chậu hoa trạng nguyên
Vẻ đẹp độc đáo và sức sống bền bỉ Hoa mào gà...
από Astrid199 2025-08-16 03:54:05 0 8χλμ.
Xã Hội
Phát hiện ' chất gây ung thư cấp độ 1', WHO kêu gọi: Ngừng ăn và khuyên cha mẹ kiểm soát
Phát hiện ' chất gây ung thư cấp độ 1', WHO kêu gọi: Ngừng ăn và khuyên cha mẹ kiểm soát
από JollyAd2446 2025-06-23 09:35:05 0 10χλμ.