A new set of security vulnerabilities could allow attackers to access and control Brother printers and multifunction devices. The flaws impact hundreds of models and, if left unpatched or misconfigured, could lead to data theft, device compromise, and further attacks on internal networks.
Field Effect is actively tracking these vulnerabilities and advising organizations to patch and secure affected devices without delay.
Researchers discovered multiple vulnerabilities that can be chained together for full access to affected devices. The most serious issues involve:
The first listed issue is especially concerning as devices ship with a default admin password based on the serial number. An attacker can extract the serial number using unauthenticated requests to services like HTTP, SNMP, or IPP. From there, the default password can be calculated and used to log in.
This attack chain involves:
Once inside the admin panel, an attacker could crash the device, exfiltrate credentials, or use the printer to pivot further into the network.
According to the researchers, over 680 Brother models are impacted, along with some devices from other vendors. The full list of affected models and firmware updates is available in Brother’s official bulletin.
While not every device has every vulnerability, all affected models include at least one issue that could lead to compromise.
Brother has acknowledged that the default password issue is tied to how the devices were originally designed. As a result, it can’t be fully fixed with a firmware update and would require changes at the manufacturing level.
These vulnerabilities highlight a recurring theme in cybersecurity: overlooked devices can become high-value targets. Printers often store credentials, expose services, and lack proper monitoring. Once compromised, they can be used to move laterally or steal data.
While the disclosure was coordinated and patches are available, one flaw remains baked into the firmware and can’t be fully fixed. That makes password hygiene and access controls even more important.
We recommend reviewing your printer fleet, applying all available updates, and locking down any remaining exposure. These steps are simple but essential.
Field Effect will continue to monitor for real-world exploitation and share any updates as the situation evolves.