EUVD-2024-54698

| CVE-2024-51978 CRITICAL
2025-06-25 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 23:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 23:19 euvd
EUVD-2024-54698
PoC Detected
Jul 25, 2025 - 17:15 vuln.today
Public exploit code
CVE Published
Jun 25, 2025 - 08:15 nvd
CRITICAL 9.8

Description

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.

Analysis

Certain devices expose serial numbers via HTTP/HTTPS/IPP and SNMP that can be used to generate the default administrator password. An unauthenticated attacker who discovers the serial number can calculate the admin password and gain full administrative control of the device without brute force.

Technical Context

The device generates its default administrator password using an algorithm based on the serial number. The serial number is exposed through multiple protocols (HTTP, HTTPS, IPP, PJL, SNMP) without authentication. An attacker can chain CVE-2024-51977 (serial number disclosure) with this vulnerability to generate the admin password remotely.

Affected Products

['Affected devices (serial-based password generation)']

Remediation

Change the default administrator password immediately. Restrict SNMP and management interface access. Disable information disclosure endpoints. Implement network segmentation for IoT/printer devices.

Priority Score

117
Low Medium High Critical
KEV: 0
EPSS: +48.3
CVSS: +49
POC: +20

Share

EUVD-2024-54698 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy