ID

VAR-202407-2513


CVE

CVE-2019-20457


TITLE

Brother MFC-J491DW C1806180757 Password Hash Disclosure

Trust: 0.1

sources: PACKETSTORM: 179806

DESCRIPTION

An issue was discovered on Brother MFC-J491DW C1806180757 devices. The printer's web-interface password hash can be retrieved without authentication, because the response header of any failed login attempt returns an incomplete authorization cookie. The value of the authorization cookie is the MD5 hash of the password in hexadecimal. An attacker can easily derive the true MD5 hash from this, and use offline cracking attacks to obtain administrative access to the device. ------------------------------------------ [Vulnerability Type] Incorrect Access Control ------------------------------------------ [Vendor of Product] Brother ------------------------------------------ [Affected Product Code Base] MFC-J491DW - C1806180757 ------------------------------------------ [Affected Component] Web admin panel ------------------------------------------ [Attack Type] Remote ------------------------------------------ [Impact Escalation of Privileges] true ------------------------------------------ [Impact Information Disclosure] true ------------------------------------------ [Attack Vectors] An attacker needs to have access to the web interface running on TCP/80 on the device. ------------------------------------------ [Has vendor confirmed or acknowledged the vulnerability?] true ------------------------------------------ [Discoverer] Konrad Leszcynski, intern at Qbit in cooperation with the Dutch Consumer Organisation ------------------------------------------ [Reference] https://global.brother Use CVE-2019-20457

Trust: 0.99

sources: NVD: CVE-2019-20457 // PACKETSTORM: 179806

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2019-20457
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2019-20457
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

sources: NVD: CVE-2019-20457

PROBLEMTYPE DATA

problemtype:CWE-276

Trust: 1.0

sources: NVD: CVE-2019-20457

TYPE

info disclosure

Trust: 0.1

sources: PACKETSTORM: 179806

EXTERNAL IDS

db:NVDid:CVE-2019-20457

Trust: 1.2

db:OTHERid:NONE

Trust: 0.1

db:PACKETSTORMid:179806

Trust: 0.1

sources: OTHER: None // PACKETSTORM: 179806 // NVD: CVE-2019-20457

REFERENCES

url:https://global.brother

Trust: 1.1

url:https://seclists.org/fulldisclosure/2024/jul/14

Trust: 1.0

url:https://support.brother.com/g/s/security/en/index.html

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-20457

Trust: 0.1

sources: PACKETSTORM: 179806 // NVD: CVE-2019-20457

CREDITS

Willem Westerhof | Secura

Trust: 0.1

sources: OTHER: None

SOURCES

db:OTHERid: -
db:PACKETSTORMid:179806
db:NVDid:CVE-2019-20457

LAST UPDATE DATE

2025-01-30T21:05:18.188000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2019-20457date:2024-11-08T19:01:03.880

SOURCES RELEASE DATE

db:OTHERid: - date:2024-07-26T13:11:06
db:PACKETSTORMid:179806date:2024-07-30T12:35:43
db:NVDid:CVE-2019-20457date:2024-11-07T18:15:15.083