
Hundreds of brother printer models have been found to harass a serious security defect that cannot be fully patched on existing devices. First Viewed by Rapid 7 In May and publicly revealed on 25 JuneThis unexpected vulnerability explains an attacker who knows – or can find out – the serial number of your printer generates your default administrator password.
Too: Patch your Windows PC now before Bootcit Malware – how is here
Yes, the same password that is set in the factory and many of us never change. But the “good” news is that you can still protect yourself by changing that default password.
What happened and how bad it is?
Zero-Day Research of Rapid 7 has revealed eight security holes in 689 brother printers, scanners and label-mekar models-and Fujifilm, Tosiba TEC, Rico and Konika Minolta, an additional 59 devices from Minolta. Of those eight flaws, seven can be packed with a completely firmware update. But big – Cve-2024-51978 – Can not be decided on any equipment already sitting in your home or office.
CVE-2024-51978 scores a CVSS 9.8 “important” severityOnce an attacker knows the serial number of a device, they can re -organize the password, log in with full privileges, and launch all types of nostiness.
Too: Is your Asus router part of a botnet? How to check – and what you can do
according to a Detailed technical analysis By Rapid 7, brother uses a password generation algorithm during manufacturing which is easily reversible. An attacker who leaks your serial number (for example Cve-2024-51977) This process can reversed, recover your factory password, and log in with full privileges – allow them to re -configure the device, reach the scan and find out books, try to trigger remote code execution)Cve-2024-51979), Or external-service credentials theft (Cve-2024-51984,
How many devices are susceptible?
Overall, 748 devices in five vendors are affected by one of at least eight weaknesses.
Beyond 689 models of brother, there are:
- 46 Fujifilm Business Innovation Printer
- 5 recite printer
- 2 Toshiba TEC Equipment
- 6 Konika Minolta Model
Too: Best online photo printing services: specialist tests and reviews
Not every defect affects every printer. For example, only 695 models are unsafe for default-packet bug, and about 208 models can be distantly crashing through refusal-service defects (Cve-2024-51982 And Cve-2024-51983,
How to tell if your printer is affected
If you own a brother printer, you can check See if your model is impressed on this brother support page (PDF),
What has been decided?
Brother has released firmware updates that patch seven of the eight weaknesses:
You can download these updates from brother’s support pages Printer, ScannerOr Label printer, Fujifilm, Ricoh, ToshibaAnd Konika Minolta Similarly, advice and firmware have been published for their affected models.
What should you do now?
One of the remaining throat-sore-cve-2024-51978- cannot be retroactively patched. This means that the only remedy of the brother is to update its manufacturing line so that the new printers ship with a non-per-perdicable default password. Therefore, if you own an existing affected printer, you now need to change the default administrator password. You can do it through it The web-based management menu of the device,
Too: 7 Password Rules Safety Experts live in 2025 – final can surprise you
Honestly, it acts as a good reminder: when you bring a new device home, even a printer, be sure to change its factory-set password.
Get top stories of morning with us in your inbox every day Tech to -up newsletter,