Potrebno je namestiti najnovejšo vdelano programsko opremo in spremeniti zasebno skrbniško geslo.
V večini primerov to zahteva orodje za posodobitev vdelane programske opreme (FIrware), če pa vas to ne vpraša, morate geslo spremeniti ročno.
Orodje za nadgradnjo vdelane programske opreme najdete tukaj:
https://support.brother.com/g/b/dow...pt525w_eu&os=10068#SelectLanguageType-375_0_1 imenuje se orodje za posodobitev vdelane programske opreme.
Reactive Q&A: Brother Printer Vulnerabilities (June 2025)
Background
A recent article published on Korben.info has raised concerns about critical vulnerabilities
affecting Brother printers. These vulnerabilities are related to the Web Based Management
(WBM) interface used in many Brother devices. Brother has acknowledged these issues and
published a security advisory outlining the risks and mitigation steps.
LINKS FOR REFERENCE ONLY:
SOURCE:
https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-
vulnerabilities-fixed/
https://www.techradar.com/pro/security/millions-of-brother-printers-threatened-by-multiple-
serious-vulnerabilities-enterprise-and-home-printers-at-risk
https://korben.info/brother-imprimantes-vulnerabilites-critiques.html
https://www.securityweek.com/new-vulnerabilities-expose-millions-of-brother-printers-to-
hacking/
Q1: What is the issue with Brother printers?
A: Brother has identified vulnerabilities in the Web Based Management (WBM) interface of
certain printer models. These could potentially allow unauthorized access or manipulation of
printer settings if the device is exposed to unsecured networks.
The full list of potentially affected models is here: CVE-2017-9765.pdf
Q2: Are European customers affected?
A: Yes, the vulnerabilities are not region-specific. Any Brother printer using the affected WBM
interface could be at risk if not properly secured. However, Brother has provided clear mitigation
steps to reduce or eliminate the risk.
This mitigation can be viewed here:
support.brother.com
000 (LO to amend link as required)
Q3: What is Brother doing to address the issue?
A: Brother has released firmware updates for affected models and published detailed guidance
on securing devices. They recommend updating to the latest firmware and ensuring printers are
used within secure, firewall-protected networks.
Customers can use our firmware update tool here:
support.brother.com
&orgc=gb&orglang=en&orgprod=group2&targetpage=18 (LO to amend link as required)
Q4: What should customers do to protect their devices?
A: Customers should:
Update their printer firmware using Brother’s Firmware Update Tool.
Change default login credentials for the WBM interface.
Restrict access to the printer’s IP address to trusted devices only.
Ensure the printer is behind a firewall or secure router.
Q5: Has any data been compromised?
A: There is no evidence that these vulnerabilities have been exploited or that any customer data
has been compromised. The vulnerabilities were responsibly disclosed and addressed
proactively by Brother.
Q6: Is this a new issue?
A: No, Brother has a history of addressing security vulnerabilities transparently. The current
advisory is part of their ongoing commitment to product security and customer safety.
Q7: Where can customers find more information?
A: Customers can visit Brother’s official Security Notification page for the latest updates and
guidance.
This mitigation can be viewed here (please amend to local link as needed):
support.brother.com
000
Q8: What is our company’s position on this?
A: Brother take cybersecurity seriously and are actively monitoring the situation. We
recommend all users follow Brother’s guidance and apply the necessary updates. We are
available to support any customers with questions or concerns.
[add local contact details / contact link]
Q13: What is the issue with default passwords on Brother devices?
A: One of the reported vulnerabilities involves the way default admin passwords are generated.
In certain cases, it may be possible for an attacker to predict the default password using publicly
available information. To stay protected, we strongly recommend:
Changing the default admin password immediately
Limiting access to the device’s web interface
Ensuring the device is used within a secure, internal network
Brother has provided firmware updates and guidance to help customers secure their devices
and reduce any potential risk.
Q14: How should we respond to CVE-2024-5178 (An unauthenticated attacker can
generate the device's default administrator password and bypass authentication), which
has been identified as a high-severity vulnerability?
A: We have never recommended using the default password. Please make sure to change the
default administrator password.
Q15: Is this vulnerability specific to Brother devices?
A: No, the vulnerabilities disclosed in this case are not limited to Brother or even to printers.
Similar vulnerabilities have been found in other brands and other types of network-connected
devices — including scanners, multifunction devices, and even IoT hardware. These issues
often stem from insecure default configurations, outdated firmware, or exposed management
interfaces.
Q16: Why did it take approximately one year to address the vulnerability?
A: Since there were many affected models, it took time to develop and evaluate the fixed
firmware, which resulted in the delay.