Hundreds of Brother printer models person been recovered to harbor a superior information flaw that can't beryllium afloat patched connected existing devices. First noticed by Rapid7 in May and publically disclosed connected June 25, this unpatchable vulnerability lets an attacker who knows -- oregon tin find retired -- your printer's serial fig make its default head password.
Also: Patch your Windows PC present earlier bootkit malware takes it implicit - here's how
Yes, the aforesaid password that's acceptable successful the mill and that galore of america ne'er change. But the "good" quality is you tin inactive support yourself by changing that default password today.
What happened and however atrocious is it?
Rapid7's zero-day probe has revealed 8 information holes crossed 689 Brother printer, scanner, and label-maker models -- and an further 59 devices from Fujifilm, Toshiba Tec, Ricoh, and Konica Minolta. Of those 8 flaws, 7 tin beryllium afloat patched with firmware updates. But the large 1 -- CVE-2024-51978 -- can't beryllium fixed connected immoderate instrumentality already sitting successful your location oregon office.
CVE-2024-51978 carries a CVSS people of 9.8 "Critical" severity. Once an attacker knows a device's serial number, they tin reconstruct the password, log successful with afloat privileges, and motorboat each sorts of nastiness.
Also: Is your Asus router portion of a botnet? How to cheque - and what you tin do
According to a detailed method analysis by Rapid7, Brother uses a password procreation algorithm during manufacturing that is easy reversible. An attacker who leaks your serial fig (for illustration via CVE-2024-51977) tin reverse this process, retrieve your mill password, and log successful with afloat privileges -- allowing them to reconfigure the device, entree scans and code books, trigger distant codification execution (CVE-2024-51979), oregon bargain external-service credentials (CVE-2024-51984).
How galore devices are susceptible?
In total, 748 devices crossed 5 vendors are affected by astatine slightest 1 of the 8 vulnerabilities.
Beyond Brother's 689 models, determination are:
- 46 Fujifilm Business Innovation printers
- 5 Ricoh printers
- 2 Toshiba Tec devices
- 6 Konica Minolta models
Also: The champion online photograph printing services: Expert tested and reviewed
Not each flaw impacts each printer. For instance, lone 695 models are susceptible to the default-password bug, and astir 208 models tin beryllium crashed remotely via the Denial-of-Service flaws (CVE-2024-51982 and CVE-2024-51983).
How to archer if your printer is affected
If you ain a Brother printer, you tin cheque to see if your exemplary is affected connected this Brother enactment leafage (PDF).
What's been fixed?
Brother has released firmware updates that spot 7 of the 8 vulnerabilities:
You tin download these updates from Brother's enactment pages (under Printers, Scanners, oregon Label Printers). Fujifilm, Ricoh, Toshiba, and Konica Minolta person likewise published advisories and firmware for their affected models.
What should you bash now?
The 1 remaining sore spot -- CVE-2024-51978 -- can't beryllium patched retroactively. That means Brother's lone remedy is to update its manufacturing enactment truthful that caller printers vessel with non-predictable default passwords. So, if you ain an existing affected printer, you request to alteration the default admin password now. You tin bash that through the device's Web-Based Management menu.
Honestly, this serves arsenic a bully reminder: erstwhile you bring a caller instrumentality home, adjacent a printer, beryllium definite to alteration its factory-set password.
Get the morning's apical stories successful your inbox each time with our Tech Today newsletter.