
Nearly 700 Brother printer fashions have been discovered to comprise various critical safety flaws that might permit an attacker to entry different gadgets in your community, and doubtlessly entry your paperwork. The identical is true of some printer fashions made by Fujifilm, Toshiba, Ricoh, and Konica Minolta …
Cybersecurity firm Rapid7 found eight vulnerabilities affecting 689 Brother printers, and 46 fashions from different manufacturers.
Probably the most egregious of those is that the default password of every printer is derived from its serial quantity, and the way in which wherein that is achieved has now been found.
Probably the most critical of the findings is the authentication bypass CVE-2024-51978. A distant unauthenticated attacker can leak the goal system’s serial quantity by way of certainly one of a number of means, and in flip generate the goal system’s default administrator password. That is because of the discovery of the default password era process utilized by Brother gadgets. This process transforms a serial quantity right into a default password.
Brother says that this can’t be mounted by a firmware replace, so the one strategy to treatment it’s to manually change your printer’s password.
The remaining vulnerabilities can be utilized in conjunction to both crash your printer or, extra significantly, acquire entry to different gadgets and providers working in your community. Within the worst of circumstances, an attacker may acquire entry to passwords saved in your community, and makes use of these to entry paperwork saved on cloud servers.
The cross again vulnerability CVE-2024-51984, permits a distant authenticated attacker to find the plaintext credentials of a number of configured exterior providers, reminiscent of LDAP or FTP. Efficiently exploiting this vulnerability provides an attacker further credentials to make use of when making an attempt to pivot additional right into a community atmosphere. Within the case of credentials to an exterior FTP service, these credentials could also be used to reveal delicate info reminiscent of paperwork saved on that FTP service.
The best way to shield your self
Brother says that seven of the eight vulnerabilities could be mounted by a firmware replace, so this ought to be achieved by all customers.
Nevertheless, the default password era flaw can’t be mounted, so for those who haven’t already modified it, accomplish that now.
Highlighted offers
Picture: 9to5Mac collage of photos from Brother and Jakub Żerdzicki on Unsplash
FTC: We use earnings incomes auto affiliate hyperlinks. Extra.