Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 08 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Brother
Brother mfc-j491dw |
|
| Weaknesses | CWE-276 | |
| CPEs | cpe:2.3:h:brother:mfc-j491dw:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Brother
Brother mfc-j491dw |
|
| Metrics |
cvssV3_1
|
Thu, 07 Nov 2024 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered on Brother MFC-J491DW C1806180757 devices. The printer's web-interface password hash can be retrieved without authentication, because the response header of any failed login attempt returns an incomplete authorization cookie. The value of the authorization cookie is the MD5 hash of the password in hexadecimal. An attacker can easily derive the true MD5 hash from this, and use offline cracking attacks to obtain administrative access to the device. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-08T16:39:32.902Z
Reserved: 2020-02-17T00:00:00
Link: CVE-2019-20457
Updated: 2024-11-08T16:39:20.706Z
Status : Awaiting Analysis
Published: 2024-11-07T18:15:15.083
Modified: 2024-11-08T19:01:03.880
Link: CVE-2019-20457
No data.
OpenCVE Enrichment
No data.