CVE-2019-13194

7.5 HIGH

📋 TL;DR

Brother printers expose sensitive information through specific URLs accessible without authentication. Attackers can retrieve configuration details, network settings, and potentially credentials by visiting crafted web addresses. This affects Brother printer models like HL-L8360CDW with vulnerable firmware versions.

💻 Affected Systems

Products:
  • Brother HL-L8360CDW
  • Other Brother printer models with similar firmware
Versions: v1.20 and earlier vulnerable versions
Operating Systems: Printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects printers with web management interface enabled (default). Specific vulnerable URLs vary by model.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative credentials, network configurations, and sensitive printer data, enabling further network compromise or printer takeover.

🟠

Likely Case

Unauthenticated users access printer configuration pages revealing network settings, device information, and potentially weak credentials.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to printer information disclosure without broader network access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only web browser access to specific printer URLs. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware v1.21 or later

Vendor Advisory: https://support.brother.com/g/b/faqend.aspx?c=us&lang=en&prod=group2&faqid=faq00100670_000

Restart Required: Yes

Instructions:

1. Download latest firmware from Brother support site. 2. Access printer web interface. 3. Navigate to firmware update section. 4. Upload and install new firmware. 5. Reboot printer.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate printers on separate VLAN without internet access

Access Control Lists

all

Restrict access to printer management interface to authorized IPs only

🧯 If You Can't Patch

  • Disable printer web interface if not required
  • Change default credentials and implement strong authentication

🔍 How to Verify

Check if Vulnerable:

Access printer IP address in browser and check if sensitive information pages are accessible without authentication

Check Version:

Check printer web interface status page or use SNMP query: snmpwalk -v2c -c public printer_ip 1.3.6.1.2.1.25.6.3.1.2

Verify Fix Applied:

Verify firmware version is v1.21 or later and test that previously accessible information disclosure URLs now require authentication

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to printer web interface from unauthorized IPs
  • Multiple failed authentication attempts followed by information disclosure requests

Network Indicators:

  • HTTP GET requests to printer IP with specific paths like /etc/mnt_info.csv
  • Unusual traffic patterns to printer management ports

SIEM Query:

source="printer_logs" AND (url="*mnt_info*" OR url="*config*" OR url="*password*") AND user="-"

🔗 References

📤 Share & Export