jvndb-2025-007519
Vulnerability from jvndb
Published
2025-06-26 18:15
Modified
2025-06-26 18:15
Severity ?
Summary
Multiple vulnerabilities in multiple BROTHER products
Details
Multiple BROTHER products provided by BROTHER INDUSTRIES, LTD. contain multiple vulnerabilities listed below. * Exposure of sensitive system information to an unauthorized control sphere (CWE-497) - CVE-2024-51977 * Use of weak credentials (CWE-1391) - CVE-2024-51978 * Stack-based buffer overflow (CWE-121) - CVE-2024-51979 * Server-side request forgery (CWE-918) - CVE-2024-51980, CVE-2024-51981 * Improper handling of unexpected data type (CWE-241) - CVE-2024-51982 * Improper enforcement of behavioral workflow (CWE-841) - CVE-2024-51983 * Insufficiently protected credentials (CWE-522) - CVE-2024-51984 Stephen Fewer of Rapid7 reported this vulnerability to the developer. JPCERT/CC coordinated between the reporter and the developer.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-007519.html",
  "dc:date": "2025-06-26T18:15+09:00",
  "dcterms:issued": "2025-06-26T18:15+09:00",
  "dcterms:modified": "2025-06-26T18:15+09:00",
  "description": "Multiple BROTHER products provided by BROTHER INDUSTRIES, LTD. contain multiple vulnerabilities listed below.\r\n\r\n* Exposure of sensitive system information to an unauthorized control sphere (CWE-497) - CVE-2024-51977\r\n* Use of weak credentials (CWE-1391) - CVE-2024-51978\r\n* Stack-based buffer overflow (CWE-121) - CVE-2024-51979\r\n* Server-side request forgery (CWE-918) - CVE-2024-51980, CVE-2024-51981\r\n* Improper handling of unexpected data type (CWE-241) - CVE-2024-51982\r\n* Improper enforcement of behavioral workflow (CWE-841) - CVE-2024-51983\r\n* Insufficiently protected credentials (CWE-522) - CVE-2024-51984\r\n\r\nStephen Fewer of Rapid7 reported this vulnerability to the developer.\r\nJPCERT/CC coordinated between the reporter and the developer.",
  "link": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-007519.html",
  "sec:cpe": {
    "#text": "cpe:/a:misc:multiple_vendors",
    "@product": "(Multiple Products)",
    "@vendor": "(Multiple Venders)",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "9.8",
    "@severity": "Critical",
    "@type": "Base",
    "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "@version": "3.0"
  },
  "sec:identifier": "JVNDB-2025-007519",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/vu/JVNVU90043828/index.html",
      "@id": "JVNVU#90043828",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-51977",
      "@id": "CVE-2024-51977",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-51978",
      "@id": "CVE-2024-51978",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-51979",
      "@id": "CVE-2024-51979",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-51980",
      "@id": "CVE-2024-51980",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-51981",
      "@id": "CVE-2024-51981",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-51982",
      "@id": "CVE-2024-51982",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-51983",
      "@id": "CVE-2024-51983",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-51984",
      "@id": "CVE-2024-51984",
      "@source": "CVE"
    },
    {
      "#text": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
      "@id": "Multiple Brother Devices: Multiple Vulnerabilities (FIXED)",
      "@source": "Related document"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/121.html",
      "@id": "CWE-121",
      "@title": "Stack-based Buffer Overflow(CWE-121)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/1391.html",
      "@id": "CWE-1391",
      "@title": "Use of Weak Credentials(CWE-1391)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/241.html",
      "@id": "CWE-241",
      "@title": "Improper Handling of Unexpected Data Type(CWE-241)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/497.html",
      "@id": "CWE-497",
      "@title": "Exposure of Sensitive System Information to an Unauthorized Control Sphere(CWE-497)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/522.html",
      "@id": "CWE-522",
      "@title": "Insufficiently Protected Credentials(CWE-522)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/841.html",
      "@id": "CWE-841",
      "@title": "Improper Enforcement of Behavioral Workflow(CWE-841)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/918.html",
      "@id": "CWE-918",
      "@title": "Server-Side Request Forgery (SSRF)(CWE-918)"
    }
  ],
  "title": "Multiple vulnerabilities in multiple BROTHER products"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.