Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Printer Privacy Security

Brother Printer Bug In 689 Models Exposes Millions To Hacking (securityweek.com) 32

An anonymous reader quotes a report from SecurityWeek: Hundreds of printer models from Brother and other vendors are impacted by potentially serious vulnerabilities discovered by researchers at Rapid7. The cybersecurity firm revealed on Wednesday that its researchers identified eight vulnerabilities affecting multifunction printers made by Brother. The security holes have been found to impact 689 printer, scanner and label maker models from Brother, and some or all of the flaws also affect 46 Fujifilm Business Innovation, five Ricoh, six Konica Minolta, and two Toshiba printers. Overall, millions of enterprise and home printers are believed to be exposed to hacker attacks due to these vulnerabilities.

The most serious of the flaws, tracked as CVE-2024-51978 and with a severity rating of 'critical', can allow a remote and unauthenticated attacker to bypass authentication by obtaining the device's default administrator password. CVE-2024-51978 can be chained with an information disclosure vulnerability tracked as CVE-2024-51977, which can be exploited to obtain a device's serial number. This serial number is needed to generate the default admin password. "This is due to the discovery of the default password generation procedure used by Brother devices," Rapid7 explained. "This procedure transforms a serial number into a default password. Affected devices have their default password set, based on each device's unique serial number, during the manufacturing process."

Having the admin password enables an attacker to reconfigure the device or abuse functionality intended for authenticated users. The remaining vulnerabilities, which have severity ratings of 'medium' and 'high', can be exploited for DoS attacks, forcing the printer to open a TCP connection, obtain the password of a configured external service, trigger a stack overflow, and perform arbitrary HTTP requests. Six of the eight vulnerabilities found by Rapid7 can be exploited without authentication.
Brother has patched most of the flaws, but CVE-2024-51978 requires a new manufacturing process to fully resolve, which will apply only to future devices.

Brother Printer Bug In 689 Models Exposes Millions To Hacking

Comments Filter:
  • by eneville ( 745111 ) on Friday June 27, 2025 @09:08AM (#65479746) Homepage

    Oh Brother...

  • They are total scams. Mainly because some shmucks tried the 'razor blade' model, aka cheap initial buy with overpriced consumable (ink). The scum even once made it so that scanner/printers would not scan if you were out of ink.

    These scumbags took over the ink based printer industry and no major ink based printer is honest any more.

    If you need a printer and do not use it every single week, get an inkless printer. For special jobs (Resumes, etc) use a copy shop.

  • by ddtmm ( 549094 ) on Friday June 27, 2025 @09:20AM (#65479782)
    It's unfortunate to see this. I have used Brother printers for a along time in our office and they have been great. One of the few printer companies I can trust.

    Once again, vulnerabilities because of not changing the default password. When will people learn?

  • by Temkin ( 112574 ) on Friday June 27, 2025 @09:24AM (#65479794)

    My 26 year old Brother HL-5370DW isn't on the list! Yay! And it even still works just fine...

    Now if I could just find a device driver for my wife's laptop...

    T

  • by Hank21 ( 6290732 ) on Friday June 27, 2025 @09:36AM (#65479816)
    It's a printer. It's almost as if every security story these days make it sound like the world will end. Do you put your printer on the Internet? People can do other unscrupulous things that have nothing to do with these CVE's - like, I dunno, maybe unplug the printer, throw it out a window, pour water or coffee on it.. It's a printer for crying out loud. Show me an exploit where the printer uses "Cloud services"(no thank you) and a remote attacker can reverse-ssh into the printer and use it as a jump point(from the Internet). These CVE's seem to be directed at people who have no common sense and might actually place the printer on the Internet. I have not sympathy for them.
    • It's a printer. It's almost as if every security story these days make it sound like the world will end. Do you put your printer on the Internet?

      Yeah, I use wifi printing almost exclusively these days. Can't remember the last time I plugged a printer wire into my laptop.

      • by rvern ( 240809 )

        More and more people actually print straight from their phones. Or just occasionally. It is just easier/faster. Phones require wi-fi printing, thus connected to your home router... and the internet. So, yes, probably 90-99% of people put their printer on the internet.

    • most people will do whatever the company says. install alllllll this software.... connect your printer to wifi.... then they will tell you when you're out of ink, etc

      on linux, with brother printer, get the universal installer, it finds your printer model and downloads and prompts you to install printer and scanner drivers.
      Install only those 2 things, and nothing else. Connect your printer by USB.

      You can remain private if you do that.
    • If a hacker already has access to the net the printer is on then you're screwed anyway. The printer will be the least interesting thing for him to hack.

      • by Bert64 ( 520050 )

        Only if you're relying on perimeter security rather than a zero trust model.

        With a perimeter model the printer could be the access vector that gets you behind the perimeter.

    • I think one of the issues is that the printer can become a platform for creating DDOS attacks, outbound from your network: part of a botnet.

      Placing it on your local network is protection from somebody accessing it directly from the Internet, but not from automated attacks from other affected devices on your network.

    • by cusco ( 717999 )

      Multi-function printer/scanner/copier/fax machines have always had the crappiest security of pretty much any common tech device since their introduction. They're surprisingly capable, with massive storage, hard-coded passwords, insecure wireless and bluetooth, analog phone connection, and almost always running a years-outdated version of Linux. Just among the clients of my former employer the FTP site of one was used to host kiddie porn (customer wondered why incoming Internet traffic had spiked), and the

    • There was a great talk at Defcon about how they were able to send a malicious fax and deliver an exploit over the network to a windows box. https://threatpost.com/def-con... [threatpost.com]

    • My personal opinion is that this is a fairly low risk problem. But, it could be a serious problem in the ideal circumstance.

      Assume you're a Chinese or North Korean agent and you've got one of these vulnerable printers in a high value target organization, CIA, MI6, the Kremlin. You, the attacker, craft a website with a page that contains requests to the printer's address. An address which you know from some previous scan or other magic. You then trick or phish a victim inside the building into going to your

    • by Bert64 ( 520050 )

      Unless you want to physically go to the printer and plug in a cable, you'll probably network it, not that it's a huge problem really because you have to go to it to collect the paper anyway.

      Creating an isolated airgapped network for the printer means you have to disconnect from your existing network first.

      Putting the printer into its own isolated VLAN with limited access from wherever your user devices are works, but is more complex to set up.

      If you're operating a perimeter based security model where you re

    • Thank you for saying this. I feel like 99% of all these exploit articles I read do not apply to myself or the general population (of people who have done basic bare minimum amount of work). Let me know when someone exploits a domain that my printer phones home to so I can avoid a reverse shell being set up.
  • by jddj ( 1085169 ) on Friday June 27, 2025 @10:09AM (#65479894) Journal

    If simply changing the admin password (as I have) is enough mitigation.

    Is it possible to generate a magic password that opens admin access regardless?

  • Don't connect your printer to the Internet.

    I have a Brother printer much older than the ones with these bugs.
    It connects to my Wi-Fi, but it has no Internet features whatsoever.

  • by SlashbotAgent ( 6477336 ) on Friday June 27, 2025 @11:25AM (#65480064)

    I've seen a LOT of printers and MFPs, Brother or otherwise. admin admin works on 96% of them.

    This particular vulnerability is way more complicated than the extensive amount of low hanging fruit that abounds. The only people getting excited about this one are the self gratifying security types. Regular users and admins are thinking; Yea? And?

  • by gweihir ( 88907 ) on Friday June 27, 2025 @11:48AM (#65480138)

    And should never, ever be Internet-reachable. Seriously. How is this news?

  • So the problem is users having default passwords. A default which is generated from the serial number is a really half assed approach and only slightly better than the old admin/admin.
    Serial numbers are sequential/predictable, so you could easily brute force if you know the algorithm.

    For something like a printer there is a much better approach:

    1) Listen only on the IPv6 link-local address by default - so there's no way to access it without being on the same VLAN.
    2) Disable remote functionality unless a physical control on the printer is set.
    3) Keep the admin account locked by default - require the user to press a physical control on the printer to temporarily unlock the account. You could even have it generate and display a random password to the user - either on an inbuilt display which most of these printers have, or by printing it.
    4) Force the password to be changed the first time the user logs in.
    5) Tie management to the first device used to access the printer, again requiring a physical action to reset.

As of next Tuesday, C will be flushed in favor of COBOL. Please update your programs.

Working...