Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Vulnerabilities Expose Millions of Brother Printers to Hacking

Posted on June 25, 2025June 25, 2025 By CWS

A whole bunch of printer fashions from Brother and different distributors are impacted by probably critical vulnerabilities found by researchers at Rapid7.

The cybersecurity agency revealed on Wednesday that its researchers recognized eight vulnerabilities affecting multifunction printers made by Brother.

The safety holes have been discovered to affect 689 printer, scanner and label maker fashions from Brother, and a few or the entire flaws additionally have an effect on 46 Fujifilm Enterprise Innovation, 5 Ricoh, six Konica Minolta, and two Toshiba printers. 

Total, hundreds of thousands of enterprise and residential printers are believed to be uncovered to hacker assaults attributable to these vulnerabilities. 

Probably the most critical of the failings, tracked as CVE-2024-51978 and with a severity ranking of ‘crucial’, can permit a distant and unauthenticated attacker to bypass authentication by acquiring the machine’s default administrator password.

CVE-2024-51978 could be chained with an info disclosure vulnerability tracked as CVE-2024-51977, which could be exploited to acquire a tool’s serial quantity. This serial quantity is required to generate the default admin password.

“That is because of the discovery of the default password era process utilized by Brother units,” Rapid7 defined. “This process transforms a serial quantity right into a default password. Affected units have their default password set, based mostly on every machine’s distinctive serial quantity, in the course of the manufacturing course of.”

Having the admin password permits an attacker to reconfigure the machine or abuse performance supposed for authenticated customers. Commercial. Scroll to proceed studying.

The remaining vulnerabilities, which have severity scores of ‘medium’ and ‘excessive’, could be exploited for DoS assaults, forcing the printer to open a TCP connection, acquire the password of a configured exterior service, set off a stack overflow, and carry out arbitrary HTTP requests. Six of the eight vulnerabilities discovered by Rapid7 could be exploited with out authentication. 

The cybersecurity firm reported its findings to Brother roughly one 12 months in the past by way of Japan’s JPCERT/CC, and the seller has launched advisories to tell prospects about these vulnerabilities. 

Brother has patched many of the flaws, however stated CVE-2024-51978 can’t be absolutely patched within the firmware. A brand new manufacturing course of will be sure that future units should not weak. For current units, a workaround is on the market. 

Advisories have additionally been revealed by JPCERT/CC, Ricoh, Fujifilm, Toshiba, and Konica Minolta.

*up to date with hyperlinks to vendor advisories

Associated: Xerox Versalink Printer Vulnerabilities Allow Lateral Motion

Associated: Printer Firm Procolored Served Contaminated Software program for Months

Associated: Essential Vulnerability Present in Canon Printer Drivers

Security Week News Tags:Brother, Expose, Hacking, Millions, Printers, Vulnerabilities

Post navigation

Previous Post: Why Sincerity Is a Strategic Asset in Cybersecurity
Next Post: SonicWall Warns of Trojanized NetExtender Stealing User Information

Related Posts

Recently Disrupted DanaBot Leaked Valuable Data for 3 Years Security Week News
Senator Urges FTC Probe of Microsoft Over Security Failures Security Week News
Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products Security Week News
Black Hat USA 2025 – Summary of Vendor Announcements (Part 2) Security Week News
Organizations Warned of Exploited PaperCut Flaw Security Week News
The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News