Device Vulnerability in Brother's Multifunction Printers and Scanners
CVE-2024-51978
Key Information:
- Vendor
Brother Industries, Ltd
- Vendor
- CVE Published:
- 25 June 2025
Badges
What is CVE-2024-51978?
An unauthenticated attacker with knowledge of the target device's serial number can exploit a vulnerability in Brother's multifunction printers and scanners to generate the default administrator password. This is achievable through various methods such as HTTP/HTTPS, IPP requests, PJL requests, or SNMP queries. This vulnerability exposes devices to unauthorized access and potential manipulation by attackers.
Affected Version(s)
ADS-1250W 0
ADS-1350W 0
ADS-1700W 0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
Brother printer bug in 689 models exposes default admin passwords
A total of 689 printer models from Brother, along with 53 other models from Fujifilm, Toshiba, and Konica Minolta, come with a default administrator password that remote attackers can generate. Even worse, there is no way to fix the flaw via firmware in existing printers.
Millions of Brother Printers Hit by Critical Unpatchable Bug
A slew of vulnerabilities, including a critical CVSS 9.8 that enables an attacker to generate the default admin password, affect hundreds of printer, scanner, and label-maker models made by manufacturer Brother.
References
EPSS Score
59% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
- 📰
First article discovered
Vulnerability published
Vulnerability Reserved
