Critical severity9.8NVD Advisory· Published Jun 25, 2025· Updated Apr 15, 2026
CVE-2024-51978
CVE-2024-51978
Description
An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdfnvd
- github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-51978.yamlnvd
- github.com/rapid7/metasploit-framework/pull/20349nvd
- support.brother.com/g/b/link.aspxnvd
- support.brother.com/g/b/link.aspxnvd
- support.brother.com/g/b/link.aspxnvd
- www.bleepingcomputer.com/news/security/brother-printer-bug-in-689-models-exposes-default-admin-passwords/nvd
- www.darkreading.com/endpoint-security/millions-brother-printers-critical-unpatchable-bugnvd
- www.konicaminolta.com/global-en/security/advisory/pdf/km-2025-0001.pdfnvd
- www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixednvd
- www.securityweek.com/new-vulnerabilities-expose-millions-of-brother-printers-to-hacking/nvd
- www.toshibatec.com/information/20250625_02.htmlnvd
News mentions
0No linked articles in our index yet.