Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51977: CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory in Brother Industries, Ltd HL-L8260CDN

0
Medium
VulnerabilityCVE-2024-51977cvecve-2024-51977cwe-538
Published: Wed Jun 25 2025 (06/25/2025, 07:15:16 UTC)
Source: CVE Database V5
Vendor/Project: Brother Industries, Ltd
Product: HL-L8260CDN

Description

An unauthenticated attacker who can access either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631), can leak several pieces of sensitive information from a vulnerable device. The URI path /etc/mnt_info.csv can be accessed via a GET request and no authentication is required. The returned result is a comma separated value (CSV) table of information. The leaked information includes the device’s model, firmware version, IP address, and serial number.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 16:38:22 UTC

Technical Analysis

CVE-2024-51977 is a vulnerability identified in the Brother Industries HL-L8260CDN printer model, classified under CWE-538, which pertains to the insertion of sensitive information into an externally accessible file or directory. The flaw allows an unauthenticated attacker to retrieve sensitive device information by accessing the URI path /etc/mnt_info.csv via a simple HTTP GET request on any of the device's exposed services: HTTP (port 80), HTTPS (port 443), or IPP (port 631). The response is a CSV-formatted file containing details such as the printer's model number, firmware version, IP address, and serial number. This information leakage occurs without any authentication or user interaction, making it trivially exploitable by anyone with network access to the device. Although the vulnerability does not permit modification of device settings or disruption of services, the exposed data can facilitate further attacks by providing attackers with valuable reconnaissance information. The vulnerability was published on June 25, 2025, and currently, there are no known exploits in the wild. The CVSS v3.1 base score is 5.3, indicating a medium severity primarily due to confidentiality impact without affecting integrity or availability. No patches or firmware updates have been linked yet, so mitigation relies on network-level controls and monitoring.

Potential Impact

The primary impact of CVE-2024-51977 is the unauthorized disclosure of sensitive device information, including model, firmware version, IP address, and serial number. This information can be leveraged by attackers to identify vulnerable devices, tailor exploits, or conduct targeted attacks such as firmware tampering, network reconnaissance, or social engineering. While the vulnerability does not directly compromise device integrity or availability, the leaked data lowers the barrier for subsequent attacks that could lead to more severe consequences. Organizations with exposed HL-L8260CDN printers on accessible networks risk information leakage that could facilitate lateral movement or escalation in a broader attack campaign. The impact is particularly relevant in environments where printers are connected to sensitive or segmented networks, as attackers could use this information to map network assets or identify outdated firmware versions susceptible to other vulnerabilities. Since no authentication is required, any attacker with network access can exploit this flaw, increasing the risk in poorly segmented or publicly accessible network environments.

Mitigation Recommendations

To mitigate CVE-2024-51977, organizations should implement the following specific measures: 1) Restrict network access to the printer’s management interfaces (HTTP, HTTPS, IPP) by applying firewall rules or network segmentation to limit exposure only to trusted administrative hosts. 2) Disable or restrict IPP and web services on the printer if not required for business operations. 3) Monitor network traffic for unauthorized access attempts to the /etc/mnt_info.csv URI and implement intrusion detection/prevention rules to alert on or block such requests. 4) Regularly audit printer firmware versions and configurations to identify devices running vulnerable versions and apply vendor patches or firmware updates as soon as they become available. 5) Employ network access controls such as VLANs or NAC solutions to isolate printers from general user networks, reducing the attack surface. 6) Consider using VPN or secure management channels for remote printer administration to prevent direct exposure of management interfaces. 7) Maintain an inventory of all Brother HL-L8260CDN devices and verify their exposure status to prioritize remediation efforts. These targeted controls go beyond generic advice by focusing on limiting access to vulnerable services and proactive monitoring.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
rapid7
Date Reserved
2024-11-04T17:19:18.808Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69caa378e6bfc5ba1d4bb8c5

Added to database: 3/30/2026, 4:23:20 PM

Last enriched: 3/30/2026, 4:38:22 PM

Last updated: 3/30/2026, 7:17:57 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses