{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T13:41:00.997","vulnerabilities":[{"cve":{"id":"CVE-2024-51983","sourceIdentifier":"cve@rapid7.com","published":"2025-06-25T08:15:32.873","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An unauthenticated attacker who can connect to the Web Services feature (HTTP TCP port 80) can issue a WS-Scan SOAP request containing an unexpected JobToken value which will crash the target device. The device will reboot, after which the attacker can reissue the command to repeatedly crash the device."},{"lang":"es","value":"Un atacante no autenticado que pueda conectarse a la función de Servicios Web (puerto HTTP TCP 80) puede emitir una solicitud SOAP WS-Scan con un valor JobToken inesperado que bloqueará el dispositivo objetivo. El dispositivo se reiniciará, tras lo cual el atacante puede volver a ejecutar el comando para bloquearlo repetidamente."}],"metrics":{"cvssMetricV31":[{"source":"cve@rapid7.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"cve@rapid7.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1286"}]}],"references":[{"url":"https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf","source":"cve@rapid7.com"},{"url":"https://github.com/sfewer-r7/BrotherVulnerabilities","source":"cve@rapid7.com"},{"url":"https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100846_000","source":"cve@rapid7.com"},{"url":"https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100848_000","source":"cve@rapid7.com"},{"url":"https://www.fujifilm.com/fbglobal/eng/company/news/notice/2025/0625_announce.html","source":"cve@rapid7.com"},{"url":"https://www.konicaminolta.com/global-en/security/advisory/pdf/km-2025-0001.pdf","source":"cve@rapid7.com"},{"url":"https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed","source":"cve@rapid7.com"},{"url":"https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000007","source":"cve@rapid7.com"},{"url":"https://www.toshibatec.com/information/20250625_02.html","source":"cve@rapid7.com"},{"url":"https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}}]}