As of June 2025, security researchers from Rapid7 identified eight vulnerabilities in the firmware of nearly 700 printer models manufactured by Brother and other brands. The most severe vulnerability (CVE-2024-51978) has a CVSS score of 9.8 and allows an unauthenticated attacker to set a standard administrator password for the affected printers, while another critical flaw (CVE-2024-51977) enables unauthorized access to sensitive information such as serial numbers. These vulnerabilities have since been exploited by cyber attackers in real-world scenarios, leading to potential security breaches and the creation of botnets using compromised devices. The discovery underscores the importance of promptly updating firmware on all connected printer models to mitigate these risks and protect against future attacks.
CrowdSec Network has reported an increase in attack attempts targeting the vulnerabilities CVE-2024-51978 and CVE-2024-51977, particularly affecting printers from Brother, FUJIFILM, and Toshiba brands since July 2025. The attacks began around Independence Day in the USA and have intensified, with many devices remaining unpatched due to incomplete updates, making them potential targets for botnet exploitation. CrowdSec recommends installing their CTI and web application firewall to block attacker IPs and isolate vulnerable printers within networks.
Thoughts on Printer Security in 2025: The recent surge in attacks exploiting printer vulnerabilities highlights the evolving landscape of cybersecurity threats beyond traditional endpoints like computers and smartphones. It’s imperative for organizations to treat all networked devices, including multifunction printers, as potential entry points for malicious activities. As we move forward, proactive measures such as regular firmware updates, robust access controls, and comprehensive security audits are crucial steps in safeguarding corporate networks against emerging risks. Additionally, educating staff about the importance of device security can significantly reduce the risk of exploitation through human error or neglect.
Similar questions
What are CVEs?
How many printer models were affected according to the text?
Which company manufactured most of the affected printers?
What does CVSS stand for and what is its purpose?
What score did the most severe vulnerability have?
Can attackers change the administrator password without authentication?
Why would someone want access to serial numbers from a printer?
How can these vulnerabilities be exploited by cybercriminals?
Is it important to update firmware on devices like printers?
What are botnets and how do they relate to this issue?