Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 04 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 08 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Brother
Brother mfc-j491dw |
|
| Weaknesses | CWE-276 | |
| CPEs | cpe:2.3:h:brother:mfc-j491dw:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Brother
Brother mfc-j491dw |
|
| Metrics |
cvssV3_1
|
Thu, 07 Nov 2024 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered on Brother MFC-J491DW C1806180757 devices. The printer's web-interface password hash can be retrieved without authentication, because the response header of any failed login attempt returns an incomplete authorization cookie. The value of the authorization cookie is the MD5 hash of the password in hexadecimal. An attacker can easily derive the true MD5 hash from this, and use offline cracking attacks to obtain administrative access to the device. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-04T17:11:56.231Z
Reserved: 2020-02-17T00:00:00.000Z
Link: CVE-2019-20457
Updated: 2025-11-04T17:11:56.231Z
Status : Awaiting Analysis
Published: 2024-11-07T18:15:15.083
Modified: 2025-11-04T18:15:36.240
Link: CVE-2019-20457
No data.
OpenCVE Enrichment
No data.