CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.
Analysis
Certain devices expose serial numbers via HTTP/HTTPS/IPP and SNMP that can be used to generate the default administrator password. An unauthenticated attacker who discovers the serial number can calculate the admin password and gain full administrative control of the device without brute force.
Technical Context
The device generates its default administrator password using an algorithm based on the serial number. The serial number is exposed through multiple protocols (HTTP, HTTPS, IPP, PJL, SNMP) without authentication. An attacker can chain CVE-2024-51977 (serial number disclosure) with this vulnerability to generate the admin password remotely.
Affected Products
['Affected devices (serial-based password generation)']
Remediation
Change the default administrator password immediately. Restrict SNMP and management interface access. Disable information disclosure endpoints. Implement network segmentation for IoT/printer devices.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2024-54698