{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T01:23:05.512","vulnerabilities":[{"cve":{"id":"CVE-2024-21824","sourceIdentifier":"vultures@jpcert.or.jp","published":"2024-03-18T08:15:06.087","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Improper authentication vulnerability in exists in multiple printers and scanners which implement Web Based Management provided by BROTHER INDUSTRIES, LTD. If this vulnerability is exploited, a network-adjacent user who can access the product may impersonate an administrative user. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."},{"lang":"es","value":"Existe una vulnerabilidad de autenticación incorrecta en varias impresoras y escáneres que implementan la administración basada en web proporcionada por BROTHER INDUSTRIES, LTD. Si se explota esta vulnerabilidad, un usuario adyacente a la red que pueda acceder al producto puede hacerse pasar por un usuario administrativo. En cuanto a los detalles de los nombres de productos, números de modelo y versiones afectados, consulte la información proporcionada por los respectivos proveedores que figuran en [Referencias]."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-306"}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN82749078/","source":"vultures@jpcert.or.jp"},{"url":"https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faqp00100601_000","source":"vultures@jpcert.or.jp"},{"url":"https://support.brother.com/g/b/link.aspx?prod=lmgroup1&faqid=faq00100823_000","source":"vultures@jpcert.or.jp"},{"url":"https://www.fujifilm.com/fbglobal/eng/company/news/notice/2024/0306_2_announce.html","source":"vultures@jpcert.or.jp"},{"url":"https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000002","source":"vultures@jpcert.or.jp"},{"url":"https://www.toshibatec.com/information/20240306_01.html","source":"vultures@jpcert.or.jp"},{"url":"https://jvn.jp/en/jp/JVN82749078/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faqp00100601_000","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://support.brother.com/g/b/link.aspx?prod=lmgroup1&faqid=faq00100823_000","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.fujifilm.com/fbglobal/eng/company/news/notice/2024/0306_2_announce.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000002","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.toshibatec.com/information/20240306_01.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}