Hundreds of models from the hardware manufacturer Brother are currently vulnerable to a critical security flaw identified by security firm Rapid7. This issue, which has left a significant portion of Brother’s lineup exposed, cannot be resolved through standard firmware updates, marking a significant challenge for users and IT departments worldwide.
The security vulnerability, designated CVE-2024-51978, carries a troubling CVSS score of 9.8, indicating its critical nature. According to Rapid7, an unauthenticated attacker can utilize this flaw to generate the default administrator password for affected devices, potentially opening doors to further exploitation. The concerning revelation highlights the risks posed by default credentials that many users neglect to change.
Vulnerabilities affecting a total of 748 devices from various manufacturers were detailed in a report from Rapid7, with the majority—689 models—belonging to Brother. The findings underscore the importance of robust security practices, particularly in the face of vulnerabilities that can lead to unauthorized access and potentially severe breaches. Other companies impacted include Fujifilm, Ricoh, Toshiba, and Konica Minolta, which collectively account for a smaller number of vulnerable devices.
In a collaborative effort to address these vulnerabilities, Rapid7 has been working alongside Brother since May 2024, with assistance from the Japanese cyber agency JPCERT/CC. While a workaround has been suggested for the unpatchable flaw – changing the default administrator password – Rapid7 warns that the failure to do so could lead to significant risks for organizations. As of now, while Rapid7 reportedly has not observed any active exploitation of these vulnerabilities, the presence of an underground market for exploits related to Brother devices raises alarms regarding the potential for future attacks.