CVE-2025-8452
📋 TL;DR
This vulnerability allows attackers on the local network to discover Brother multi-function printer serial numbers via the eSCL/uscan protocol. The serial number can then be used to calculate the default administrator password using CVE-2024-51978. This affects Brother printers with vulnerable firmware that expose eSCL services.
💻 Affected Systems
- Brother multi-function printers with vulnerable firmware
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative access to printers, enabling configuration changes, data exfiltration, or using printers as network footholds.
Likely Case
Local network attackers compromise printer administration, potentially disrupting printing services or accessing scanned documents.
If Mitigated
Minimal impact if default passwords are changed, as calculated passwords become invalid.
🎯 Exploit Status
Requires two-step attack: serial number discovery via eSCL, then password calculation via CVE-2024-51978 methodology.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Brother advisory for specific firmware updates
Vendor Advisory: https://support.brother.com/g/b/faqend.aspx?c=us&lang=en&prod=group2&faqid=faq00100851_000
Restart Required: No
Instructions:
1. Check Brother security advisory for affected models. 2. Download latest firmware from Brother support site. 3. Apply firmware update following manufacturer instructions.
🔧 Temporary Workarounds
Change Default Administrator Password
allChange the default admin password to prevent password calculation attacks
Access printer web interface > Login as admin > Change password in settings
Disable eSCL/USCAN Services
allDisable eSCL protocol if not required for operations
Access printer web interface > Network settings > Disable eSCL/USCAN services
🧯 If You Can't Patch
- Change all default administrator passwords immediately
- Network segmentation: Isolate printers to separate VLAN with restricted access
🔍 How to Verify
Check if Vulnerable:
Check if printer responds to eSCL discovery requests on local network and has default admin password
Check Version:
Access printer web interface > Maintenance/System > Firmware version
Verify Fix Applied:
Verify firmware version matches patched version from Brother advisory and test password calculation no longer works
📡 Detection & Monitoring
Log Indicators:
- Multiple failed admin login attempts
- Unexpected configuration changes
Network Indicators:
- eSCL protocol scans from unauthorized sources
- Unusual admin interface access patterns
SIEM Query:
source_ip scanning for port 443/tcp (eSCL) AND destination_ip in printer_ip_range
🔗 References
- https://help.runzero.com/docs/installing-an-explorer/
- https://support.brother.com/g/b/faqend.aspx?c=us&lang=en&prod=group2&faqid=faq00100851_000
- https://takeonme.org/gcves/GCVE-1337-2025-00000000000000000000000000000000000000000000000001011111011111010111111001000000000000000000000000000000000000000000000000000000001
- https://www.cve.org/CVERecord?id=CVE-2024-51977
- https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed/