Понад 600+ моделей принтерів Brother мають вразливість, що розкриває паролі адміністратора за замовчуванням. Фото ілюстративне з Depositphotos
Researchers have discovered a serious vulnerability in a series of popular printers that exposes administrator passwords by default. Worse, it cannot be fixed through the firmware of existing printers.
The affected models include 689 Brother printers and some Fujifilm (46 models), Toshiba (2), Ricoh (5), and Konica Minolta (6).
Vulnerability CVE-2024-51978 — is part of a set of eight vulnerabilities that Rapid7 researchers discovered (via Bleeping Computer) during an ongoing investigation of Brother equipment. It can be used to determine the administrator password, gain control of the printers, and execute remote code to disable the device and further penetrate other parts of the network to which it is connected.
The default password in the respective printers is generated at the production stage using a special algorithm that uses the serial number of the device.
According to Rapid7’s analysis, the password generation algorithm performs an easily reversible process:
Attackers can gain access to the target printer’s serial number using various methods or by exploiting CVE-2024-51977, then use an algorithm to generate a default administrator password and log in as administrator to do whatever they want — including accessing stored scanned files, address books, or collecting credentials.
«While all flaws have been fixed in firmware updates provided by the affected vendors, the case of CVE-2024-51978 is challenging from a risk management perspective. The vulnerability is rooted in the password generation logic used in hardware manufacturing, and therefore any devices manufactured before it was discovered will have predictable passwords unless users change them», — Bleeping Computer writes.
The first step is to change the default administrator password and then apply a firmware update. In general, it is recommended to limit access to the printer’s administrative interfaces via insecure protocols and external networks.
Each of the manufacturers of the affected devices has issued their own instructions for this purpose: