CVE-2025-49797: Files or directories accessible to external parties in BROTHER INDUSTRIES, LTD. Multiple driver installers for Windows
Multiple Brother driver installers for Windows contain a privilege escalation vulnerability. If exploited, an arbitrary program may be executed with the administrative privilege. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
AI Analysis
Technical Summary
CVE-2025-49797 is a high-severity privilege escalation vulnerability affecting multiple Brother Industries, Ltd. driver installers for Windows. The vulnerability arises because certain files or directories within these driver installers are accessible to external parties, allowing an attacker with limited privileges to execute arbitrary code with administrative privileges. This escalation occurs without requiring user interaction, and the attacker only needs low privileges on the affected system to exploit it. The CVSS 3.0 base score of 7.8 reflects the high impact on confidentiality, integrity, and availability, as the attacker can gain full control over the system by executing arbitrary programs as an administrator. The vulnerability is local (AV:L), requires low attack complexity (AC:L), and only low privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component and does not extend beyond it. While specific affected product versions and models are not detailed here, the vulnerability impacts multiple Brother driver installers for Windows, which are commonly used to install printer and multifunction device drivers. Exploitation could allow attackers to install persistent malware, manipulate system configurations, or exfiltrate sensitive data. No known exploits are currently reported in the wild, but the vulnerability's characteristics make it a significant risk if weaponized. The lack of patch links suggests that users should closely monitor official Brother communications for updates and advisories.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for enterprises and public sector entities that deploy Brother printers and multifunction devices widely across their networks. Successful exploitation could lead to full system compromise on affected Windows machines, enabling attackers to bypass security controls, install backdoors, or disrupt operations. Confidentiality is at risk as attackers could access sensitive documents or credentials stored on compromised systems. Integrity and availability are also threatened, as attackers could alter system files or disrupt printing services critical to business workflows. Given the administrative privileges gained, attackers could move laterally within corporate networks, escalating the threat to organizational infrastructure. This is particularly concerning for sectors with stringent data protection requirements under GDPR, where unauthorized access or data breaches can lead to severe regulatory penalties. The vulnerability's local attack vector means that initial access is required, but this could be achieved via phishing, compromised user accounts, or insider threats, making it a realistic concern for European organizations with diverse user bases.
Mitigation Recommendations
Organizations should immediately inventory their Windows systems to identify installations of Brother driver software and verify the versions in use against vendor advisories. Until patches are released, applying the principle of least privilege is critical: restrict user permissions to prevent local users from executing unauthorized installers or accessing sensitive driver installation directories. Employ application whitelisting to block unauthorized executables and monitor for unusual process executions related to Brother drivers. Network segmentation can limit lateral movement if a system is compromised. Additionally, implement endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of privilege escalation attempts. Regularly review and apply Windows security updates and ensure that all Brother driver software is updated promptly once patches become available. Educate users about the risks of running untrusted installers and enforce strong authentication mechanisms to reduce the risk of initial access by attackers.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-49797: Files or directories accessible to external parties in BROTHER INDUSTRIES, LTD. Multiple driver installers for Windows
Description
Multiple Brother driver installers for Windows contain a privilege escalation vulnerability. If exploited, an arbitrary program may be executed with the administrative privilege. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
AI-Powered Analysis
Technical Analysis
CVE-2025-49797 is a high-severity privilege escalation vulnerability affecting multiple Brother Industries, Ltd. driver installers for Windows. The vulnerability arises because certain files or directories within these driver installers are accessible to external parties, allowing an attacker with limited privileges to execute arbitrary code with administrative privileges. This escalation occurs without requiring user interaction, and the attacker only needs low privileges on the affected system to exploit it. The CVSS 3.0 base score of 7.8 reflects the high impact on confidentiality, integrity, and availability, as the attacker can gain full control over the system by executing arbitrary programs as an administrator. The vulnerability is local (AV:L), requires low attack complexity (AC:L), and only low privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component and does not extend beyond it. While specific affected product versions and models are not detailed here, the vulnerability impacts multiple Brother driver installers for Windows, which are commonly used to install printer and multifunction device drivers. Exploitation could allow attackers to install persistent malware, manipulate system configurations, or exfiltrate sensitive data. No known exploits are currently reported in the wild, but the vulnerability's characteristics make it a significant risk if weaponized. The lack of patch links suggests that users should closely monitor official Brother communications for updates and advisories.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for enterprises and public sector entities that deploy Brother printers and multifunction devices widely across their networks. Successful exploitation could lead to full system compromise on affected Windows machines, enabling attackers to bypass security controls, install backdoors, or disrupt operations. Confidentiality is at risk as attackers could access sensitive documents or credentials stored on compromised systems. Integrity and availability are also threatened, as attackers could alter system files or disrupt printing services critical to business workflows. Given the administrative privileges gained, attackers could move laterally within corporate networks, escalating the threat to organizational infrastructure. This is particularly concerning for sectors with stringent data protection requirements under GDPR, where unauthorized access or data breaches can lead to severe regulatory penalties. The vulnerability's local attack vector means that initial access is required, but this could be achieved via phishing, compromised user accounts, or insider threats, making it a realistic concern for European organizations with diverse user bases.
Mitigation Recommendations
Organizations should immediately inventory their Windows systems to identify installations of Brother driver software and verify the versions in use against vendor advisories. Until patches are released, applying the principle of least privilege is critical: restrict user permissions to prevent local users from executing unauthorized installers or accessing sensitive driver installation directories. Employ application whitelisting to block unauthorized executables and monitor for unusual process executions related to Brother drivers. Network segmentation can limit lateral movement if a system is compromised. Additionally, implement endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of privilege escalation attempts. Regularly review and apply Windows security updates and ensure that all Brother driver software is updated promptly once patches become available. Educate users about the risks of running untrusted installers and enforce strong authentication mechanisms to reduce the risk of initial access by attackers.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-06-11T04:48:58.284Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 685bc521a1cfc9c6487cfb4b
Added to database: 6/25/2025, 9:45:05 AM
Last enriched: 8/20/2025, 12:48:24 AM
Last updated: 9/29/2025, 9:10:47 AM
Views: 61
Related Threats
CVE-2025-36262: CWE-1286 Improper Validation of Syntactic Correctness of Input in IBM Planning Analytics Local
MediumCVE-2025-36132: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Planning Analytics Local
MediumCVE-2025-10659: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in MegaSys Telenium Online Web Application:
CriticalCVE-2025-41098: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
HighCVE-2025-11149: Denial of Service (DoS) in node-static
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.