Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Brother printer in 689 models highlights the password password
    Security

    Brother printer in 689 models highlights the password password

    PineapplesUpdateBy PineapplesUpdateJune 27, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Brother printer in 689 models highlights the password password
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Brother printer in 689 models highlights the password password

    A total of 689 printer models from brother, Fujifilm, Tosiba and 53 other models of Konika Minolta come with a default administrator password that can generate remote attackers. Worse, there is no way to fix the defect through firmware in existing printers.

    Defended, tracked under Cve-2024-51978Is part of a set of eight weaknesses Rapid7 discovered by researchers Brother during a long test of hardware.










    CVE Description Affected service CVSS
    Cve-2024-51977 An informal attacker can leak sensitive information. HTTP (Port 80), HTTPS (Port 443), IPP (Port 631) 5.3 (medium)
    Cve-2024-51978 A default administrator of an informal attacker device can generate passwords. HTTP (Port 80), HTTPS (Port 443), IPP (Port 631) 9.8 (important)
    Cve-2024-51979 A certified attacker can trigger a stack -based buffer overflow. HTTP (Port 80), HTTPS (Port 443), IPP (Port 631) 7.2 (high)
    Cve-2024-51980 An informal attacker may force the device to open a TCP connection. Web services on http (Port 80) 5.3 (medium)
    Cve-2024-51981 An informal attacking may force the device to request an arbitrary HTTP. Web services on http (Port 80) 5.3 (medium)
    Cve-2024-51982 An informal attacker can crash the device. PJL (Port 9100) 7.5 (high)
    Cve-2024-51983 An informal attacker can crash the device. Web services on http (Port 80) 7.5 (high)
    Cve-2024-51984 A certified attacker may disclose a password of a configured external service. LDAP, FTP 6.8 (medium)

    This important vulnerability can be chained by chains with chains with crash or pivot within the network with other weaknesses discovered by Rapid 7, taking control of equipment, taking control of equipment, performing remote code, or pivot within the network.

    Not all flaws affect each one of the 689 brother printer model, but other manufacturers including Fujifilm (46 models), Konika Minolta (6), Ricoh (5), and Toshiba (2) are also affected.

    Number of models affected for each of the eight flaws
    Number of models affected for each of the eight flaws
    Source: Rapid 7

    Unprotected password generation

    The default password in the affected printer is generated during manufacturing using a custom logirtham based on the serial number of the device.

    according to a Detailed technical analysis By Rapid 7, the password generation algorithm follows an easily reversible process:

    1. Take the first 16 letters of the serial number.
    2. Add 8 bytes obtained from a stable “salt” table.
    3. The result is the result with sha256.
    4. Base64- Hash Hash.
    5. Take the first eight letters and replace some letters with special characters.

    Attackers can leak the serial number of the target printer using or exploiting various methods. Cve-2024-51977They can then use algorithm to generate default administrator passwords and log in as administrators.

    From there, they can configure the printer again, access the stored scan, read the address books, exploit Cve-2024-51979 Distance code for execution, or exploitation Cve-2024-51984 For harvesting credentials.

    Rapid 7 started its disclosure process in May 2024 and assisted by JPCERT/CC in coordination of revelations for other manufacturers.

    Although all flaws have been fixed in the firmware update provided by the affected manufacturers, the case is complicated with CVE-2024–51978 in terms of risk management.

    The vulnerability lies in the password generation logic used in hardware manufacturing, and therefore, there will be predicted passwords in any devices made before its discovery until the users change them.

    “The brother has indicated that this vulnerability cannot be completely removed in the firmware, and requires a change in the manufacturing process of all affected models,” Rapid 7 explains about CVE -2024-51978.

    The users of the current brother printer listed in the affected model consider their devices to be unsafe and immediately change the default administrator password, after which the firmware applies updates.

    In general, it is recommended to restrict access to the unprotected protocol and external network’s administrator interfaces.

    Security bulletin with instructions on what users should do Brother, Konika Minolta, Fujifilm, RicohAnd Toshiba,


    Tines needle

    Patching meant complex scripts, long and endless fire drills. No more.

    In this new guide, the tines break down how it is leveling with modern organ automation. Patch fast, reduce overhead, and focus on strategic tasks – no complex script is required.

    brother Highlights Models password printer
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleStop doing this – it’s destroying your hdd
    Next Article How to beat your time limit and reach the goals rapidly – without burning
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How is the battery life of this $600 HP laptop better than some of the latest models?

    January 18, 2026
    Startups

    I compared the two best LG OLED TV models on the market right now – there’s a surprise winner

    January 17, 2026
    Startups

    Why I prefer this $200 Motorola phone to cheaper models from Google and Samsung

    January 4, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.