Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    X suffers its second major outage this week

    Ocak 18, 2026

    US senators press Big Tech over sexualized deepfakes

    Ocak 18, 2026

    ChatGPT is set to introduce targeted ads for some users

    Ocak 18, 2026
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      US senators press Big Tech over sexualized deepfakes

      Ocak 18, 2026

      ChatGPT’s $8 Go plan launches in the US how it stacks up against Plus and Pro

      Ocak 17, 2026

      HDR10, HDR10+, and Dolby Vision compared: which HDR format should you choose for your TV?

      Ocak 17, 2026

      Verizon outage shows the risk of relying on one carrier

      Ocak 17, 2026

      OpenAI, Anthropic, and Google unveil new AI healthcare tools

      Ocak 17, 2026
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » Unpatchable Security Flaw Found in Brother Printers
    Tech

    Unpatchable Security Flaw Found in Brother Printers

    By ayaksızHaziran 30, 2025Yorum yapılmamış2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Security flaws discovered in hundreds of Brother printers and related devices pose a critical risk to users worldwide, according to a detailed investigation by cybersecurity firm Rapid7. The study identified eight vulnerabilities affecting 689 models—including Brother’s widely used printers, scanners, and label printers—as well as products from Fujifilm, Konica Minolta, Ricoh, and Toshiba that rely on Brother components. The severity of these flaws ranges from moderate to critical, with some scoring up to 9.8 on the CVSS scale, signaling potentially devastating impacts on device security and network integrity.

    Chief among these concerns is a vulnerability known as CVE-2024-51978, which reveals a fundamental weakness in Brother’s approach to default administrator password generation. Instead of assigning unique, randomized passwords, Brother’s devices use a static algorithm that calculates passwords based on the device’s serial number. Because serial numbers can be accessed through other vulnerabilities, attackers can easily reverse-engineer the admin password, effectively granting themselves full control over the printer. This access could be exploited to manipulate printer settings, intercept sensitive data, or serve as an entry point for broader network attacks. Other vulnerabilities discovered allow hackers to remotely crash printers, extract confidential information, and access passwords of connected devices, compounding the security risk.

    In response, Brother has issued firmware updates that patch seven of the eight vulnerabilities. Unfortunately, the critical password flaw is embedded during the manufacturing stage and cannot be rectified with a simple software fix. Brother has announced plans to overhaul their manufacturing process to generate more secure default passwords in future models, but existing devices remain vulnerable unless users take manual steps to secure them. Users are strongly advised to immediately change the default administrator password to a strong, unique credential and ensure their firmware is fully up to date.

    Further security measures are also recommended to mitigate risk. Network administrators should place printers behind firewalls, restrict access to sensitive ports such as 9100, and ideally isolate printer networks from critical business infrastructure. Brother’s cooperation with security groups like Rapid7 and JPCERT/CC is ongoing, aiming to monitor and respond to emerging threats. This situation highlights the growing challenge of securing Internet-connected office devices, which often lack robust protections despite their essential role in daily business operations. Users and IT teams must remain vigilant and act quickly to prevent attackers from exploiting these critical vulnerabilities.

    Post Views: 112
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    ayaksız
    • Website

    Related Posts

    US senators press Big Tech over sexualized deepfakes

    Ocak 18, 2026

    ChatGPT’s $8 Go plan launches in the US how it stacks up against Plus and Pro

    Ocak 17, 2026

    HDR10, HDR10+, and Dolby Vision compared: which HDR format should you choose for your TV?

    Ocak 17, 2026
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2026 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.