{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T14:24:15.985","vulnerabilities":[{"cve":{"id":"CVE-2024-51978","sourceIdentifier":"cve@rapid7.com","published":"2025-06-25T08:15:31.223","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request."},{"lang":"es","value":"Un atacante no autenticado que conozca el número de serie del dispositivo objetivo puede generar la contraseña de administrador predeterminada. Un atacante no autenticado puede descubrir primero el número de serie del dispositivo objetivo mediante CVE-2024-51977 a través de HTTP/HTTPS/IPP, una solicitud PJL o una solicitud SNMP. "}],"metrics":{"cvssMetricV31":[{"source":"cve@rapid7.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"cve@rapid7.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1391"}]}],"references":[{"url":"https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf","source":"cve@rapid7.com"},{"url":"https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-51978.yaml","source":"cve@rapid7.com"},{"url":"https://github.com/rapid7/metasploit-framework/pull/20349","source":"cve@rapid7.com"},{"url":"https://github.com/sfewer-r7/BrotherVulnerabilities","source":"cve@rapid7.com"},{"url":"https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100846_000","source":"cve@rapid7.com"},{"url":"https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100848_000","source":"cve@rapid7.com"},{"url":"https://support.brother.com/g/b/link.aspx?prod=lmgroup1&faqid=faqp00100620_000","source":"cve@rapid7.com"},{"url":"https://www.konicaminolta.com/global-en/security/advisory/pdf/km-2025-0001.pdf","source":"cve@rapid7.com"},{"url":"https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed","source":"cve@rapid7.com"},{"url":"https://www.toshibatec.com/information/20250625_02.html","source":"cve@rapid7.com"},{"url":"https://www.bleepingcomputer.com/news/security/brother-printer-bug-in-689-models-exposes-default-admin-passwords/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.darkreading.com/endpoint-security/millions-brother-printers-critical-unpatchable-bug","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.securityweek.com/new-vulnerabilities-expose-millions-of-brother-printers-to-hacking/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}}]}