An issue was discovered on Brother MFC-J491DW C1806180757 devices. The printer's web-interface password hash can be retrieved without authentication, because the response header of any failed login attempt returns an incomplete authorization cookie. The value of the authorization cookie is the MD5 hash of the password in hexadecimal. An attacker can easily derive the true MD5 hash from this, and use offline cracking attacks to obtain administrative access to the device.
Metrics
Affected Vendors & Products
References
History
Fri, 08 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Brother
Brother mfc-j491dw |
|
Weaknesses | CWE-276 | |
CPEs | cpe:2.3:h:brother:mfc-j491dw:-:*:*:*:*:*:*:* | |
Vendors & Products |
Brother
Brother mfc-j491dw |
|
Metrics |
cvssV3_1
|
Thu, 07 Nov 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered on Brother MFC-J491DW C1806180757 devices. The printer's web-interface password hash can be retrieved without authentication, because the response header of any failed login attempt returns an incomplete authorization cookie. The value of the authorization cookie is the MD5 hash of the password in hexadecimal. An attacker can easily derive the true MD5 hash from this, and use offline cracking attacks to obtain administrative access to the device. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-11-07T00:00:00
Updated: 2024-11-08T16:39:32.902Z
Reserved: 2020-02-17T00:00:00
Link: CVE-2019-20457
Vulnrichment
Updated: 2024-11-08T16:39:20.706Z
NVD
Status : Awaiting Analysis
Published: 2024-11-07T18:15:15.083
Modified: 2024-11-08T19:01:03.880
Link: CVE-2019-20457
Redhat
No data.