U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-51977

Change History

New CVE Received from Rapid7, Inc. 6/25/2025 4:15:30 AM

Action Type Old Value New Value
Added Description

								
							
							
						
An unauthenticated attacker who can access either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631), can leak several pieces of sensitive information from a vulnerable device. The URI path /etc/mnt_info.csv can be accessed via a GET request and no authentication is required. The returned result is a comma separated value (CSV) table of information. The leaked information includes the device’s model, firmware version, IP address, and serial number.
Added CVSS V3.1

								
							
							
						
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Added CWE

								
							
							
						
CWE-538
Added Reference

								
							
							
						
https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf
Added Reference

								
							
							
						
https://github.com/sfewer-r7/BrotherVulnerabilities
Added Reference

								
							
							
						
https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100846_000
Added Reference

								
							
							
						
https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100848_000
Added Reference

								
							
							
						
https://support.brother.com/g/b/link.aspx?prod=lmgroup1&faqid=faqp00100620_000
Added Reference

								
							
							
						
https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed
OSZAR »