Medium severity5.3NVD Advisory· Published Jun 25, 2025· Updated Apr 15, 2026
CVE-2024-51980
CVE-2024-51980
Description
An unauthenticated attacker may perform a limited server side request forgery (SSRF), forcing the target device to open a TCP connection to an arbitrary port number on an arbitrary IP address. This SSRF leverages the WS-Addressing ReplyTo element in a Web service (HTTP TCP port 80) SOAP request. The attacker can not control the data sent in the SSRF connection, nor can the attacker receive any data back. This SSRF is suitable for TCP port scanning of an internal network when the Web service (HTTP TCP port 80) is exposed across a network segment.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdfnvd
- support.brother.com/g/b/link.aspxnvd
- support.brother.com/g/b/link.aspxnvd
- support.brother.com/g/b/link.aspxnvd
- www.fujifilm.com/fbglobal/eng/company/news/notice/2025/0625_announce.htmlnvd
- www.konicaminolta.com/global-en/security/advisory/pdf/km-2025-0001.pdfnvd
- www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixednvd
- www.ricoh.com/products/security/vulnerabilities/vulnvd
- www.toshibatec.com/information/20250625_02.htmlnvd
News mentions
0No linked articles in our index yet.