Search criteria

32 vulnerabilities

CVE-2025-35028 (GCVE-0-2025-35028)

Vulnerability from cvelistv5 – Published: 2025-11-30 21:27 – Updated: 2025-12-01 17:58
VLAI?
Summary
By providing a command-line argument starting with a semi-colon ; to an API endpoint created by the EnhancedCommandExecutor class of the HexStrike AI MCP server, the resultant composed command is executed directly in the context of the MCP server’s normal privilege; typically, this is root. There is no attempt to sanitize these arguments in the default configuration of this MCP server at the affected version (as of commit 2f3a5512 in September of 2025).
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
AHA
References
https://takeonme.org/gcves/GCVE-1337-2025-0000000… third-party-advisorytechnical-descriptionexploit
https://github.com/0x4m4/hexstrike-ai/issues/115 issue-tracking
Impacted products
Vendor Product Version
0x4m4 HexStrike AI Affected: 33267047667b9accfbf0fdac1c1c7ff12f3a5512 (commit-hash)
Create a notification for this product.
Credits
jippen of AHA! todb of AHA!
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-35028",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-01T17:58:00.817720Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-01T17:58:12.880Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "EnhancedCommandExecutor"
          ],
          "product": "HexStrike AI",
          "vendor": "0x4m4",
          "versions": [
            {
              "status": "affected",
              "version": "33267047667b9accfbf0fdac1c1c7ff12f3a5512",
              "versionType": "commit-hash"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "jippen of AHA!"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb of AHA!"
        }
      ],
      "datePublic": "2025-11-30T19:37:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "By providing a command-line argument starting with a semi-colon ; to an API endpoint created by the EnhancedCommandExecutor class of the HexStrike AI MCP server, the resultant composed command is executed directly in the context of the MCP server\u2019s normal privilege; typically, this is root. There is no attempt to sanitize these arguments in the default configuration of this MCP server at the affected version (as of commit 2f3a5512 in September of 2025)."
            }
          ],
          "value": "By providing a command-line argument starting with a semi-colon ; to an API endpoint created by the EnhancedCommandExecutor class of the HexStrike AI MCP server, the resultant composed command is executed directly in the context of the MCP server\u2019s normal privilege; typically, this is root. There is no attempt to sanitize these arguments in the default configuration of this MCP server at the affected version (as of commit 2f3a5512 in September of 2025)."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The original advisory contains two example working proofs-of-concept exploits (which disclose the running user and the local /etc/passwd file to the remote requestor)."
            }
          ],
          "value": "The original advisory contains two example working proofs-of-concept exploits (which disclose the running user and the local /etc/passwd file to the remote requestor)."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-01T16:32:34.455Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory",
            "technical-description",
            "exploit"
          ],
          "url": "https://takeonme.org/gcves/GCVE-1337-2025-00000000000000000000000000000000000000000000000000111111111111111111111111000000000000000000000000000000000000000000000000000000011"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://github.com/0x4m4/hexstrike-ai/issues/115"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "HexStrike AI MCP Server Command Injection",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-35028",
    "datePublished": "2025-11-30T21:27:56.057Z",
    "dateReserved": "2025-04-15T20:41:31.524Z",
    "dateUpdated": "2025-12-01T17:58:12.880Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-35021 (GCVE-0-2025-35021)

Vulnerability from cvelistv5 – Published: 2025-11-04 00:23 – Updated: 2025-11-05 14:54
VLAI?
Summary
By failing to authenticate three times to an unconfigured Abilis CPX device via SSH, an attacker can login to a restricted shell on the fourth attempt, and from there, relay connections.
CWE
  • CWE-1188 - Insecure Default Initialization of Resource
Assigner
AHA
References
https://www.runzero.com/advisories/abilis-cpx-aut… technical-descriptionthird-party-advisory
https://takeonme.org/gcves/GCVE-1337-2025-0000000… technical-descriptionthird-party-advisory
https://support.abilis.net/relnotes/cpx2k/R9.0.ht… vendor-advisory
Impacted products
Vendor Product Version
Abilis CPX Affected: 0 , < 9.0.7 (semver)
Create a notification for this product.
Credits
HD Moore Tod Beardsley AHA!
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-35021",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-05T14:54:07.847887Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-05T14:54:15.000Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CPX",
          "vendor": "Abilis",
          "versions": [
            {
              "lessThan": "9.0.7",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "HD Moore"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Tod Beardsley"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "AHA!"
        }
      ],
      "datePublic": "2025-11-04T00:06:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "By failing to authenticate three times to an unconfigured Abilis CPX device via SSH, an attacker can login to a restricted shell on the fourth attempt, and from there, relay connections."
            }
          ],
          "value": "By failing to authenticate three times to an unconfigured Abilis CPX device via SSH, an attacker can login to a restricted shell on the fourth attempt, and from there, relay connections."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1188",
              "description": "CWE-1188 Insecure Default Initialization of Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-04T14:55:16.723Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "technical-description",
            "third-party-advisory"
          ],
          "url": "https://www.runzero.com/advisories/abilis-cpx-authentication-bypass-cve-2025-35021/"
        },
        {
          "tags": [
            "technical-description",
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/gcves/GCVE-1337-2025-00000000000000000000000000000000000000000000000001011111111111011111111110000000000000000000000000000000000000000000000000000000100"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.abilis.net/relnotes/cpx2k/R9.0.html#R9.0.7"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Abilis CPX Fallback Shell Connection Relay",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-35021",
    "datePublished": "2025-11-04T00:23:23.924Z",
    "dateReserved": "2025-04-15T20:40:32.308Z",
    "dateUpdated": "2025-11-05T14:54:15.000Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-35027 (GCVE-0-2025-35027)

Vulnerability from cvelistv5 – Published: 2025-09-26 06:53 – Updated: 2025-10-07 21:10
VLAI?
Summary
Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
AHA
Impacted products
Vendor Product Version
Unitree Go2 Affected: 0 , ≤ 1.1.8 (semver)
Create a notification for this product.
    Unitree G1 Affected: 0 , ≤ 1.4.4 (semver)
Create a notification for this product.
Credits
Andreas Makris Kevin Finisterre Konstantin Severov todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-35027",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-30T18:04:59.805441Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-30T18:05:04.102Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/Bin4ry/UniPwn"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Go2",
          "vendor": "Unitree",
          "versions": [
            {
              "lessThanOrEqual": "1.1.8",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "G1",
          "vendor": "Unitree",
          "versions": [
            {
              "lessThanOrEqual": "1.4.4",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Andreas Makris"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Kevin Finisterre"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Konstantin Severov"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-09-26T06:41:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script.\u0026nbsp;All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches."
            }
          ],
          "value": "Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script.\u00a0All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A proof-of-concept has been published at the referenced UniPwn Github repo."
            }
          ],
          "value": "A proof-of-concept has been published at the referenced UniPwn Github repo."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-07T21:10:12.489Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-35027"
        },
        {
          "tags": [
            "technical-description"
          ],
          "url": "https://github.com/Bin4ry/UniPwn"
        },
        {
          "tags": [
            "media-coverage"
          ],
          "url": "https://spectrum.ieee.org/unitree-robot-exploit"
        },
        {
          "tags": [
            "government-resource"
          ],
          "url": "https://x.com/committeeonccp/status/1971250635548033311"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://www.cve.org/cverecord?id=CVE-2025-60017"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://www.cve.org/cverecord?id=CVE-2025-60250"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Unitree Multiple Robotic Products Command Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-35027",
    "datePublished": "2025-09-26T06:53:49.585Z",
    "dateReserved": "2025-04-15T20:41:31.524Z",
    "dateUpdated": "2025-10-07T21:10:12.489Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-8452 (GCVE-0-2025-8452)

Vulnerability from cvelistv5 – Published: 2025-08-12 15:23 – Updated: 2025-10-08 13:39
VLAI?
Summary
By using the "uscan" protocol provided by the eSCL specification, an attacker can discover the serial number of multi-function printers that implement the Brother-provided firmware. This serial number can, in turn, can be leveraged by the flaw described by CVE-2024-51978 to calculate the default administrator password. This flaw is similar to CVE-2024-51977, with the only difference being the protocol by which an attacker can use to learn the remote device's serial number. The eSCL/uscan vector is typically only exposed on the local network. Any discovery service that implements the eSCL specification can be used to exploit this vulnerability, and one such implementation is the runZero Explorer. Changing the default administrator password will render this vulnerability virtually worthless, since the calculated default administrator password would no longer be the correct password.
CWE
  • CWE-538 - Insertion of Sensitive Information into Externally-Accessible File or Directory
Assigner
AHA
Impacted products
Vendor Product Version
Brother Industries, Ltd DCP-L8410CDW Affected: 0 , ≤ ZK (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L8610CDW Affected: 0 , ≤ ZK (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L8690CDW Affected: 0 , ≤ ZK (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L8900CDW Affected: 0 , ≤ ZM (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L9570CDW Affected: 0 , ≤ ZM (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L9577CDW Affected: 0 , ≤ ZM (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L8610CDW(for Japan) Affected: 0 , ≤ ZD (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L9570CDW(for Japan) Affected: 0 , ≤ ZD (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-L5218DN Affected: 0 , ≤ 1.12(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-L5228DW Affected: 0 , ≤ 1.12(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5510DN Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5512DN Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5518DN Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5510DW Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5610DN Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5660DN Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5662DN Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5710DN Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5715DN Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5718DN Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5710DW Affected: 0 , ≤ 1.12(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5715DW Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5717DW Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5728DW Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5912DW Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5915DW Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6710DW Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6720DW Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6810DW Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6910DN Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6915DN Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6915DN CSP Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6912DW Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6915DW Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-EX910 Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-EX915DW Affected: 0 , ≤ 1.18(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6820DW Affected: 0 , ≤ 1.15(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L9610CDN Affected: 0 , ≤ 1.22(S) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L9630CDN Affected: 0 , ≤ 1.22(S) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L9635CDN Affected: 0 , ≤ 1.22(S) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L9670CDN Affected: 0 , ≤ 1.22(S) (semver)
Create a notification for this product.
    Brother Industries, Ltd NFC-EX670 Affected: 0 , ≤ 1.22(S) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-EX670W Affected: 0 , ≤ 1.22(S) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L3555CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L3560CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L3568CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3720CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3740CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3740CDWE Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3755CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3760CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3765CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3768CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3780CDW Affected: 0 , ≤ 1.12(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L8340CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L8390CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L8395CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-L3300CDW Affected: 0 , ≤ 1.16(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L3515CDW Affected: 0 , ≤ 1.16(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L3520CDW Affected: 0 , ≤ 1.16(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L3520CDWE Affected: 0 , ≤ 1.16(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L3528CDW Affected: 0 , ≤ 1.16(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2600D Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7600DB Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7600D Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2627DWE Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7620DWB Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7620DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2627DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7640DWB Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2627DWXL Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7640DW Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2605DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-L2464DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2622DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2625DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2620DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-L2475DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-L2465DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2640DN Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2647DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2640DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2802DN Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2827DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2806DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2805DW Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2802DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2800DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2765DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2760DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-B7800DN Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-B7811DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-B7810DWB Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-B7810DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2835DW Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2827DWXL Affected: 0 , ≤ 1.20(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7548W Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7558W Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7578DW Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2508DW Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2518DW Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7608W Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7628DW Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7638DN Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7648DW Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2628DW Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2548DW Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2648DW Affected: 0 , ≤ 1.16(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2600DW Affected: 0 , ≤ 1.09(C) (semver)
Create a notification for this product.
    Brother Industries, Ltd FAX-L2800DW Affected: 0 , ≤ 1.09(C) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2680DW Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2660DW Affected: 0 , ≤ 1.08(C) (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-L2480DW Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2665DW Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2817DW Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2807DW Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2820DWXL Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2820DW Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2861DW Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2862DW Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2860DW Affected: 0 , ≤ 1.08(C) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2885DW Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2880DWXL Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2886DW Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2860DWE Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2880DW Affected: 0 , ≤ 1.08(C) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2900DW Affected: 0 , ≤ 1.03(C) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2900DWXL Affected: 0 , ≤ 1.03(C) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7658DW Affected: 0 , ≤ 1.12(E) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7650DW Affected: 0 , ≤ 1.12(E) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2920DW Affected: 0 , ≤ 1.12(E) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2922DW Affected: 0 , ≤ 1.12(E) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2960DW Affected: 0 , ≤ 1.03(C) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2980DW Affected: 0 , ≤ 1.03(C) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L1630W Affected: 0 , ≤ 1.05(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L1632W Affected: 0 , ≤ 1.05(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L1638W Affected: 0 , ≤ 1.06(E) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L1848W Affected: 0 , ≤ 1.06(E) (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-L2395DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2730DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2732DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2750DW Affected: 0 , ≤ R (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2750DWXL Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2751DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2770DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2771DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2730DWR Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2750DWR Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-7195DW Affected: 0 , ≤ R (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-7895DW Affected: 0 , ≤ R (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2730DN Affected: 0 , ≤ R (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-L2390DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2530DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2531DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2532DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2535DW Affected: 0 , ≤ M (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2537DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7520DW Affected: 0 , ≤ V (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2550DN Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2550DW Affected: 0 , ≤ M (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2551DN Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2551DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2552DN Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7535DW Affected: 0 , ≤ V (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2690DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2710DN Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2712DN Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2710DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2712DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2713DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2715DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2716DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2717DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-B7715DW Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2530DWR Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2550DNR Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2710DNR Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2710DWR Affected: 0 , ≤ ZC (semver)
Create a notification for this product.
    Brother Industries, Ltd FAX-L2710DN Affected: 0 , ≤ R (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-7190DN Affected: 0 , ≤ V (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-B7530DN Affected: 0 , ≤ V (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L2550DW(TWN) Affected: 0 , ≤ V (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-7890DN Affected: 0 , ≤ V (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-B7720DN Affected: 0 , ≤ V (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L2715DW(for Tiwan, Koria) Affected: 0 , ≤ V (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-7090DW Affected: 0 , ≤ M (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-7190DW Affected: 0 , ≤ M (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L3510CDW Affected: 0 , ≤ ZA (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L3517CDW Affected: 0 , ≤ ZA (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-L3290CDW Affected: 0 , ≤ ZA (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L3551CDW Affected: 0 , ≤ ZA (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L3550CDW Affected: 0 , ≤ ZE (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-9030CDN Affected: 0 , ≤ ZE (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3710CDW Affected: 0 , ≤ ZE (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3730CDN Affected: 0 , ≤ ZE (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-9150CDN Affected: 0 , ≤ ZE (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3735CDN Affected: 0 , ≤ ZE (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3745CDW Affected: 0 , ≤ ZE (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3750CDW Affected: 0 , ≤ ZE (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-9350CDW Affected: 0 , ≤ ZE (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L3770CDW Affected: 0 , ≤ ZA (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6970DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6950DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6902DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6900DW Affected: 0 , ≤ ZP (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6800DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6750DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6702DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6700DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5902DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5900DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5850DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5802DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5800DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-8540DN Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5755DW Affected: 0 , ≤ ZP (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5750DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-8530DN Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5700DN Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5702DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L5700DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L6600DW Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5652DN Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5650DN Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5602DN Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5600DN Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5502DN Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-L5500DN Affected: 0 , ≤ ZZ (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-L6900DWG Affected: 0 , ≤ U (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T830DW Affected: 0 , ≤ 1.03(A) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T835DW Affected: 0 , ≤ 1.03(A) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-T930DW Affected: 0 , ≤ 1.03(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-T935DW Affected: 0 , ≤ 1.03(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T530DW Affected: 0 , ≤ 1.01(A) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T535DW Affected: 0 , ≤ 1.01(A) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T536DW Affected: 0 , ≤ 1.01(A) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T730DW Affected: 0 , ≤ 1.01(A) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T735DW Affected: 0 , ≤ 1.01(A) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T435W Affected: 0 , ≤ 1.02(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T430W Affected: 0 , ≤ 1.02(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T436W Affected: 0 , ≤ 1.02(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T439W Affected: 0 , ≤ 1.02(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5340DW Affected: 0 , ≤ 1.20(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5345DW Affected: 0 , ≤ 1.20(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J2340DW Affected: 0 , ≤ 1.20(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5340DWE Affected: 0 , ≤ 1.20(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5740DW Affected: 0 , ≤ 1.16(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6540DW Affected: 0 , ≤ 1.18(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6740DW Affected: 0 , ≤ 1.18(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J3540DW Affected: 0 , ≤ 1.18(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J7100CDW Affected: 0 , ≤ 1.18(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6540DWE Affected: 0 , ≤ 1.18(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6940DW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J3940DW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J7300CDW Affected: 0 , ≤ 1.19(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5855DW Affected: 0 , ≤ 1.25(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5855DW XL Affected: 0 , ≤ 1.25(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5800CDW Affected: 0 , ≤ 1.25(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5955DW Affected: 0 , ≤ 1.25(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6555DW Affected: 0 , ≤ 1.19(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6555DW XL Affected: 0 , ≤ 1.19(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6955DW Affected: 0 , ≤ 1.38(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6957DW Affected: 0 , ≤ 1.38(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J7500CDW Affected: 0 , ≤ 1.38(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J7600CDW Affected: 0 , ≤ 1.38(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6959DW Affected: 0 , ≤ 1.16(G) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J7700CDW Affected: 0 , ≤ 1.16(G) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T520W Affected: 0 , ≤ 1.21(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T525W Affected: 0 , ≤ 1.21(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T720DW Affected: 0 , ≤ 1.20(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T725DW Affected: 0 , ≤ 1.20(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T820DW Affected: 0 , ≤ 1.20(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T825DW Affected: 0 , ≤ 1.20(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-T920DW Affected: 0 , ≤ 1.23(N) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-T925DW Affected: 0 , ≤ 1.23(N) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T220 Affected: 0 , ≤ 1.27(K) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T225 Affected: 0 , ≤ 1.27(K) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T226 Affected: 0 , ≤ 1.27(K) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T420W Affected: 0 , ≤ 1.27(K) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T425W Affected: 0 , ≤ 1.27(K) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T426W Affected: 0 , ≤ 1.27(K) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T428W Affected: 0 , ≤ 1.27(K) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-C421W Affected: 0 , ≤ 1.04(D) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J1205W(XL) Affected: 0 , ≤ 1.15(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J1215W Affected: 0 , ≤ 1.15(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J1200W(XL) Affected: 0 , ≤ 1.15(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J1200N Affected: 0 , ≤ 1.15(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J1200WE Affected: 0 , ≤ 1.15(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J4335DW(XL) Affected: 0 , ≤ 1.38(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J4340DW(XL) Affected: 0 , ≤ 1.38(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J4345DW XL Affected: 0 , ≤ 1.38(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-4340DWE Affected: 0 , ≤ 1.38(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J4535DW(XL) Affected: 0 , ≤ 1.38(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J4540DW(XL) Affected: 0 , ≤ 1.38(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J4440DW Affected: 0 , ≤ 1.38(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J4140N Affected: 0 , ≤ 1.09(F) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J4440N Affected: 0 , ≤ 1.11(G) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J4540N Affected: 0 , ≤ 1.11(G) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J4940DN Affected: 0 , ≤ 1.11(G) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J1010DW Affected: 0 , ≤ 1.15(K) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J1012DW Affected: 0 , ≤ 1.15(K) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J1050DW Affected: 0 , ≤ 1.14(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J1170DW Affected: 0 , ≤ 1.10(G) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J1140DW Affected: 0 , ≤ 1.13(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J526N Affected: 0 , ≤ 1.11(K) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J914N Affected: 0 , ≤ 1.11(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J926N-WB Affected: 0 , ≤ 1.11(J) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J904N Affected: 0 , ≤ 1.11(K) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J739DN Affected: 0 , ≤ 1.14(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J739DWN Affected: 0 , ≤ 1.14(M) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J939DN Affected: 0 , ≤ 1.13(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J939DWN Affected: 0 , ≤ 1.13(L) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J1800N Affected: 0 , ≤ 1.14(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J1700DW Affected: 0 , ≤ 1.13(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J1800DW Affected: 0 , ≤ 1.13(H) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J1800DW Affected: 0 , ≤ 1.02(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J1203N Affected: 0 , ≤ 1.02(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-C1210N Affected: 0 , ≤ 1.03(C) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J4143N Affected: 0 , ≤ 1.02(A) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J4443N Affected: 0 , ≤ 1.03(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J4543N Affected: 0 , ≤ 1.03(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J528N Affected: 0 , ≤ 1.04(C) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J915N Affected: 0 , ≤ 1.03(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J928N-WB Affected: 0 , ≤ 1.03(B) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J905N Affected: 0 , ≤ 1.04(C) (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J815DW XL Affected: 0 , ≤ J (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J805DW Affected: 0 , ≤ J (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J805DW XL Affected: 0 , ≤ J (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J1100DW Affected: 0 , ≤ P (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J995DW Affected: 0 , ≤ P (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J995DW XL Affected: 0 , ≤ P (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J1300DW Affected: 0 , ≤ P (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J988N Affected: 0 , ≤ Q (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J1500N Affected: 0 , ≤ P (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J1605DN Affected: 0 , ≤ K (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5845DW(XL) Affected: 0 , ≤ N (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5945DW Affected: 0 , ≤ T (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6945DW Affected: 0 , ≤ T (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6947DW Affected: 0 , ≤ T (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-J6000DW Affected: 0 , ≤ S (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-J6100DW Affected: 0 , ≤ S (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6997CDW Affected: 0 , ≤ T (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6999CDW Affected: 0 , ≤ T (semver)
Create a notification for this product.
    Brother Industries, Ltd HL-J6000CDW Affected: 0 , ≤ S (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-T4500DW Affected: 0 , ≤ P (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5330DW Affected: 0 , ≤ W (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5335DW Affected: 0 , ≤ W (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J2330DW Affected: 0 , ≤ W (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5730DW Affected: 0 , ≤ Y (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5830DW Affected: 0 , ≤ Y (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5930DW Affected: 0 , ≤ Y (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J2730DW Affected: 0 , ≤ Y (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6530DW Affected: 0 , ≤ W (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6730DW Affected: 0 , ≤ W (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J3530DW Affected: 0 , ≤ W (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6930DW Affected: 0 , ≤ Z (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6935DW Affected: 0 , ≤ Z (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J3930DW Affected: 0 , ≤ Z (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6535DW Affected: 0 , ≤ Z (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6580CDW Affected: 0 , ≤ R (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6980CDW Affected: 0 , ≤ S (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6995CDW Affected: 0 , ≤ S (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J5630CDW Affected: 0 , ≤ L (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6583CDW Affected: 0 , ≤ K (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J6983CDW Affected: 0 , ≤ N (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T510W Affected: 0 , ≤ Q (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T510W(for China) Affected: 0 , ≤ N (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T710W Affected: 0 , ≤ Q (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-T710W(for China) Affected: 0 , ≤ N (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-T810W Affected: 0 , ≤ Q (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-T810W(for China) Affected: 0 , ≤ N (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-T910DW Affected: 0 , ≤ Q (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J572DW Affected: 0 , ≤ P (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J491DW Affected: 0 , ≤ Q (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J497DW Affected: 0 , ≤ Q (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J772DW Affected: 0 , ≤ T (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J774DW Affected: 0 , ≤ T (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J890DW Affected: 0 , ≤ T (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J895DW Affected: 0 , ≤ T (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J690DW Affected: 0 , ≤ T (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J572N Affected: 0 , ≤ W (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J577N Affected: 0 , ≤ W (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J582N Affected: 0 , ≤ W (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J972N Affected: 0 , ≤ Y (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J973N-W/B Affected: 0 , ≤ Y (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J978N-W/B Affected: 0 , ≤ Y (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J981N Affected: 0 , ≤ Y (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J982N-W/B Affected: 0 , ≤ Y (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J893N Affected: 0 , ≤ X (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J898N Affected: 0 , ≤ X (semver)
Create a notification for this product.
    Brother Industries, Ltd NFC-J903N Affected: 0 , ≤ X (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J738DN Affected: 0 , ≤ M (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J738DWN Affected: 0 , ≤ M (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J998DN Affected: 0 , ≤ M (semver)
Create a notification for this product.
    Brother Industries, Ltd MFC-J998DWN Affected: 0 , ≤ M (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J587N Affected: 0 , ≤ F (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J987N-W Affected: 0 , ≤ F (semver)
Create a notification for this product.
    Brother Industries, Ltd DCP-J987N-B Affected: 0 , ≤ F (semver)
Create a notification for this product.
    Brother Industries, Ltd DS/MDS-940DW Affected: 0 , ≤ G(1.7) (semver)
Create a notification for this product.
    Brother Industries, Ltd ADS-3300W Affected: 0 , ≤ P(2.28) (semver)
Create a notification for this product.
    Brother Industries, Ltd ADS-4500W Affected: 0 , ≤ P(2.28) (semver)
Create a notification for this product.
    Brother Industries, Ltd ADS-2700We Affected: 0 , ≤ P(2.28) (semver)
Create a notification for this product.
    Brother Industries, Ltd ADS-4300N Affected: 0 , ≤ P(2.28) (semver)
Create a notification for this product.
    Brother Industries, Ltd ADS-4700W Affected: 0 , ≤ P(2.28) (semver)
Create a notification for this product.
    Brother Industries, Ltd ADS-4900W Affected: 0 , ≤ P(2.28) (semver)
Create a notification for this product.
    Brother Industries, Ltd ADS-1350W Affected: 0 , ≤ C(1.06) (semver)
Create a notification for this product.
    Brother Industries, Ltd ADS-1800W Affected: 0 , ≤ C(1.06) (semver)
Create a notification for this product.
    Toshiba Tec e-STUDIO301DN Affected: 0 , ≤ M2309191505 (semver)
Create a notification for this product.
    Toshiba Tec e-STUDIO302DNF Affected: 0 , ≤ M2309191611 (semver)
Create a notification for this product.
    Konica Minolta, Inc. bizhub 5020i Affected: 0 , ≤ U2406280431 (Ver R) (semver)
Create a notification for this product.
    Konica Minolta, Inc. bizhub 5000i Affected: 0 , ≤ 1.32 (semver)
Create a notification for this product.
    Konica Minolta, Inc. bizhub 4020i Affected: 0 , ≤ U2406280431 (Ver R) (semver)
Create a notification for this product.
    Konica Minolta, Inc. bizhub 4000i Affected: 0 , ≤ 1.28 (semver)
Create a notification for this product.
Credits
Rob King of AHA! and runZero Tod Beardsley of AHA! Stephen Fewer of Rapid7 JPCERT/CC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-8452",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-12T15:33:27.294573Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-12T15:33:45.044Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L8410CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZK",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L8610CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZK",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L8690CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZK",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L8900CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZM",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L9570CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZM",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L9577CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZM",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L8610CDW(for Japan)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZD",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L9570CDW(for Japan)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZD",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-L5218DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.12(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-L5228DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.12(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5510DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5512DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5518DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5510DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5610DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5660DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5662DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5710DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5715DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5718DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5710DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.12(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5715DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5717DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5728DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5912DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5915DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6710DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6720DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6810DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6910DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6915DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6915DN CSP",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6912DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6915DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-EX910",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-EX915DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6820DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.15(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L9610CDN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.22(S)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L9630CDN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.22(S)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L9635CDN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.22(S)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L9670CDN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.22(S)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "NFC-EX670",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.22(S)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-EX670W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.22(S)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L3555CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L3560CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L3568CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3720CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3740CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3740CDWE",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3755CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3760CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3765CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3768CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3780CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.12(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L8340CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L8390CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L8395CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-L3300CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L3515CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L3520CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L3520CDWE",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L3528CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2600D",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7600DB",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7600D",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2627DWE",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7620DWB",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7620DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2627DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7640DWB",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2627DWXL",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7640DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2605DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-L2464DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2622DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2625DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2620DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-L2475DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-L2465DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2640DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2647DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2640DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2802DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2827DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2806DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2805DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2802DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2800DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2765DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2760DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-B7800DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-B7811DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-B7810DWB",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-B7810DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2835DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2827DWXL",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7548W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7558W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7578DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2508DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2518DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7608W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7628DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7638DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7648DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2628DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2548DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2648DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2600DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.09(C)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "FAX-L2800DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.09(C)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2680DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2660DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.08(C)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-L2480DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2665DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2817DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2807DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2820DWXL",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2820DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2861DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2862DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2860DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.08(C)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2885DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2880DWXL",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2886DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2860DWE",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2880DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.08(C)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2900DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(C)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2900DWXL",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(C)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7658DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.12(E)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7650DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.12(E)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2920DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.12(E)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2922DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.12(E)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2960DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(C)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2980DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(C)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L1630W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.05(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L1632W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.05(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L1638W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.06(E)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L1848W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.06(E)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-L2395DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2730DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2732DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2750DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "R",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2750DWXL",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2751DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2770DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2771DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2730DWR",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2750DWR",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-7195DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "R",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-7895DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "R",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2730DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "R",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-L2390DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2530DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2531DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2532DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2535DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "M",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2537DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7520DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "V",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2550DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2550DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "M",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2551DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2551DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2552DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7535DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "V",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2690DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2710DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2712DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2710DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2712DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2713DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2715DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2716DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2717DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-B7715DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2530DWR",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2550DNR",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2710DNR",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2710DWR",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZC",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "FAX-L2710DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "R",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-7190DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "V",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-B7530DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "V",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L2550DW(TWN)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "V",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-7890DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "V",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-B7720DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "V",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L2715DW(for Tiwan, Koria)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "V",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-7090DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "M",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-7190DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "M",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L3510CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZA",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L3517CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZA",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-L3290CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZA",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L3551CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZA",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L3550CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZE",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-9030CDN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZE",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3710CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZE",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3730CDN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZE",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-9150CDN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZE",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3735CDN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZE",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3745CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZE",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3750CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZE",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-9350CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZE",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L3770CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZA",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6970DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6950DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6902DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6900DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZP",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6800DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6750DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6702DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6700DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5902DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5900DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5850DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5802DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5800DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-8540DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5755DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZP",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5750DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-8530DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5700DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5702DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L5700DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L6600DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5652DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5650DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5602DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5600DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5502DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-L5500DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "ZZ",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-L6900DWG",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "U",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T830DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(A)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T835DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(A)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-T930DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-T935DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T530DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.01(A)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T535DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.01(A)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T536DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.01(A)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T730DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.01(A)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T735DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.01(A)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T435W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.02(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T430W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.02(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T436W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.02(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T439W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.02(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5340DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5345DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J2340DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5340DWE",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5740DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6540DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6740DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J3540DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J7100CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6540DWE",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.18(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6940DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J3940DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J7300CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5855DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.25(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5855DW XL",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.25(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5800CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.25(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5955DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.25(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6555DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6555DW XL",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.19(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6955DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.38(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6957DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.38(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J7500CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.38(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J7600CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.38(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6959DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(G)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J7700CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.16(G)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T520W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.21(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T525W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.21(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T720DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T725DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T820DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T825DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.20(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-T920DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.23(N)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-T925DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.23(N)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T220",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.27(K)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T225",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.27(K)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T226",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.27(K)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T420W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.27(K)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T425W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.27(K)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T426W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.27(K)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T428W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.27(K)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-C421W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.04(D)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J1205W(XL)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.15(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J1215W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.15(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J1200W(XL)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.15(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J1200N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.15(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J1200WE",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.15(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J4335DW(XL)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.38(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J4340DW(XL)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.38(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J4345DW XL",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.38(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-4340DWE",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.38(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J4535DW(XL)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.38(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J4540DW(XL)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.38(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J4440DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.38(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J4140N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.09(F)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J4440N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.11(G)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J4540N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.11(G)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J4940DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.11(G)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J1010DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.15(K)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J1012DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.15(K)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J1050DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J1170DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.10(G)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J1140DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.13(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J526N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.11(K)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J914N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.11(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J926N-WB",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.11(J)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J904N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.11(K)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J739DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J739DWN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(M)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J939DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.13(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J939DWN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.13(L)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J1800N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.14(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J1700DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.13(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J1800DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.13(H)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J1800DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.02(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J1203N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.02(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-C1210N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(C)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J4143N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.02(A)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J4443N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J4543N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J528N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.04(C)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J915N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J928N-WB",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.03(B)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J905N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "1.04(C)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J815DW XL",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "J",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J805DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "J",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J805DW XL",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "J",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J1100DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J995DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J995DW XL",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J1300DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J988N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Q",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J1500N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J1605DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "K",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5845DW(XL)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "N",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5945DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "T",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6945DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "T",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6947DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "T",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-J6000DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "S",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-J6100DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "S",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6997CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "T",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6999CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "T",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HL-J6000CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "S",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-T4500DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5330DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "W",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5335DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "W",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J2330DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "W",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5730DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Y",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5830DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Y",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5930DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Y",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J2730DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Y",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6530DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "W",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6730DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "W",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J3530DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "W",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6930DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Z",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6935DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Z",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J3930DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Z",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6535DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Z",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6580CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "R",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6980CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "S",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6995CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "S",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J5630CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "L",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6583CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "K",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J6983CDW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "N",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T510W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Q",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T510W(for China)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "N",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T710W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Q",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-T710W(for China)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "N",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-T810W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Q",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-T810W(for China)",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "N",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-T910DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Q",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J572DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J491DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Q",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J497DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Q",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J772DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "T",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J774DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "T",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J890DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "T",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J895DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "T",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J690DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "T",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J572N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "W",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J577N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "W",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J582N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "W",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J972N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Y",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J973N-W/B",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Y",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J978N-W/B",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Y",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J981N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Y",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J982N-W/B",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "Y",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J893N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "X",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J898N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "X",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "NFC-J903N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "X",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J738DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "M",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J738DWN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "M",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J998DN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "M",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MFC-J998DWN",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "M",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J587N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "F",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J987N-W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "F",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DCP-J987N-B",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "F",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DS/MDS-940DW",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "G(1.7)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ADS-3300W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P(2.28)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ADS-4500W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P(2.28)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ADS-2700We",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P(2.28)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ADS-4300N",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P(2.28)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ADS-4700W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P(2.28)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ADS-4900W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "P(2.28)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ADS-1350W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "C(1.06)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ADS-1800W",
          "vendor": "Brother Industries, Ltd",
          "versions": [
            {
              "lessThanOrEqual": "C(1.06)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "e-STUDIO301DN",
          "vendor": "Toshiba Tec",
          "versions": [
            {
              "lessThanOrEqual": "M2309191505",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "e-STUDIO302DNF",
          "vendor": "Toshiba Tec",
          "versions": [
            {
              "lessThanOrEqual": "M2309191611",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "bizhub 5020i",
          "vendor": "Konica Minolta, Inc.",
          "versions": [
            {
              "lessThanOrEqual": "U2406280431 (Ver R)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "bizhub 5000i",
          "vendor": "Konica Minolta, Inc.",
          "versions": [
            {
              "lessThanOrEqual": "1.32",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "bizhub 4020i",
          "vendor": "Konica Minolta, Inc.",
          "versions": [
            {
              "lessThanOrEqual": "U2406280431 (Ver R)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "bizhub 4000i",
          "vendor": "Konica Minolta, Inc.",
          "versions": [
            {
              "lessThanOrEqual": "1.28",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Rob King of AHA! and runZero"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "Tod Beardsley of AHA!"
        },
        {
          "lang": "en",
          "type": "other",
          "value": "Stephen Fewer of Rapid7"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "JPCERT/CC"
        }
      ],
      "datePublic": "2025-08-12T15:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eBy using the \"uscan\" protocol provided by the eSCL specification, an attacker can discover the serial number of multi-function printers that implement the Brother-provided firmware. This serial number can, in turn, can be leveraged by the flaw described by CVE-2024-51978 to calculate the default administrator password. This flaw is similar to\u0026nbsp;CVE-2024-51977, with the only difference being the protocol by which an attacker can use to learn the remote device\u0027s serial number. The eSCL/uscan vector is typically only exposed on the local network.\u0026nbsp;\u003cspan style=\"background-color: rgba(232, 232, 232, 0.04);\"\u003eAny discovery service that implements the eSCL specification can be used to exploit this vulnerability, and one such implementation is the runZero Explorer.\u0026nbsp;Changing the default administrator password will render this vulnerability virtually worthless, since the calculated default administrator password would no longer be the correct password.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "By using the \"uscan\" protocol provided by the eSCL specification, an attacker can discover the serial number of multi-function printers that implement the Brother-provided firmware. This serial number can, in turn, can be leveraged by the flaw described by CVE-2024-51978 to calculate the default administrator password. This flaw is similar to\u00a0CVE-2024-51977, with the only difference being the protocol by which an attacker can use to learn the remote device\u0027s serial number. The eSCL/uscan vector is typically only exposed on the local network.\u00a0Any discovery service that implements the eSCL specification can be used to exploit this vulnerability, and one such implementation is the runZero Explorer.\u00a0Changing the default administrator password will render this vulnerability virtually worthless, since the calculated default administrator password would no longer be the correct password."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Any discovery service that implements the eSCL specification can be used to exploit this vulnerability. One such implementation is the runZero Explorer, described at\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://help.runzero.com/docs/installing-an-explorer/\"\u003ehttps://help.runzero.com/docs/installing-an-explorer/\u003c/a\u003e."
            }
          ],
          "value": "Any discovery service that implements the eSCL specification can be used to exploit this vulnerability. One such implementation is the runZero Explorer, described at\u00a0 https://help.runzero.com/docs/installing-an-explorer/ ."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-538",
              "description": "CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-08T13:39:35.427Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.brother.com/g/b/faqend.aspx?c=us\u0026lang=en\u0026prod=group2\u0026faqid=faq00100851_000"
        },
        {
          "tags": [
            "third-party-advisory",
            "related"
          ],
          "url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed/"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://help.runzero.com/docs/installing-an-explorer/"
        },
        {
          "tags": [
            "technical-description",
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/gcves/GCVE-1337-2025-00000000000000000000000000000000000000000000000001011111011111010111111001000000000000000000000000000000000000000000000000000000001"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-51977"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Unauthenticated leak of sensitive information affecting multiple models from Brother Industries, Ltd., Toshiba Tec, and Konica Minolta, Inc.",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Changing the default administrator password will render this vulnerability virtually worthless, since the calculated default administrator password (as described in the related vulnerability, CVE-2025-51978) would no longer\u0026nbsp;be the correct password."
            }
          ],
          "value": "Changing the default administrator password will render this vulnerability virtually worthless, since the calculated default administrator password (as described in the related vulnerability, CVE-2025-51978) would no longer\u00a0be the correct password."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-8452",
    "datePublished": "2025-08-12T15:23:00.577Z",
    "dateReserved": "2025-08-01T00:49:49.961Z",
    "dateUpdated": "2025-10-08T13:39:35.427Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-35010 (GCVE-0-2025-35010)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:06 – Updated: 2025-06-09 03:16
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNPINGTM command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
Microhard IPn4Gii / Bullet-LTE Firmware Affected: 0 , ≤ v1.2.0-r1132 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-35010",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T03:15:50.314272Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-09T03:16:04.477Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IPn4Gii / Bullet-LTE Firmware",
          "vendor": "Microhard",
          "versions": [
            {
              "lessThanOrEqual": "v1.2.0-r1132",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNPINGTM command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNPINGTM command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-08T21:06:16.368Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-35010/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Microhard Bullet-LTE and IPn4Gii AT+MNPINGTM Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-35010",
    "datePublished": "2025-06-08T21:06:16.368Z",
    "dateReserved": "2025-04-15T20:40:30.572Z",
    "dateUpdated": "2025-06-09T03:16:04.477Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-35009 (GCVE-0-2025-35009)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:06 – Updated: 2025-06-09 03:17
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNNETSP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
Microhard IPn4Gii / Bullet-LTE Firmware Affected: 0 , ≤ v1.2.0-r1132 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-35009",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T03:16:59.379120Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-09T03:17:10.831Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IPn4Gii / Bullet-LTE Firmware",
          "vendor": "Microhard",
          "versions": [
            {
              "lessThanOrEqual": "v1.2.0-r1132",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNNETSP command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNNETSP command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-08T21:06:05.426Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-35009/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Microhard Bullet-LTE and IPn4Gii AT+MNNETSP Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-35009",
    "datePublished": "2025-06-08T21:06:05.426Z",
    "dateReserved": "2025-04-15T20:40:30.572Z",
    "dateUpdated": "2025-06-09T03:17:10.831Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-35008 (GCVE-0-2025-35008)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:05 – Updated: 2025-06-09 03:18
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MMNAME command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
Microhard IPn4Gii / Bullet-LTE Firmware Affected: 0 , ≤ v1.2.0-r1132 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-35008",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T03:17:45.431505Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-09T03:18:02.029Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IPn4Gii / Bullet-LTE Firmware",
          "vendor": "Microhard",
          "versions": [
            {
              "lessThanOrEqual": "v1.2.0-r1132",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MMNAME command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MMNAME command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-08T21:05:52.090Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-35008/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Microhard Bullet-LTE and IPn4Gii AT+MMNAME Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-35008",
    "datePublished": "2025-06-08T21:05:52.090Z",
    "dateReserved": "2025-04-15T20:40:30.572Z",
    "dateUpdated": "2025-06-09T03:18:02.029Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-35007 (GCVE-0-2025-35007)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:05 – Updated: 2025-06-09 03:18
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFRULE command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
Microhard IPn4Gii / Bullet-LTE Firmware Affected: 0 , ≤ v1.2.0-r1132 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-35007",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T03:18:45.423248Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-09T03:18:53.105Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IPn4Gii / Bullet-LTE Firmware",
          "vendor": "Microhard",
          "versions": [
            {
              "lessThanOrEqual": "v1.2.0-r1132",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFRULE command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFRULE command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-08T21:05:38.698Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-35007/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Microhard Bullet-LTE and IPn4Gii AT+MFRULE Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-35007",
    "datePublished": "2025-06-08T21:05:38.698Z",
    "dateReserved": "2025-04-15T20:40:30.571Z",
    "dateUpdated": "2025-06-09T03:18:53.105Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-35006 (GCVE-0-2025-35006)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:05 – Updated: 2025-06-09 03:19
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFPORTFWD command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
Microhard IPn4Gii / Bullet-LTE Firmware Affected: 0 , ≤ v1.2.0-r1132 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-35006",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T03:19:38.062525Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-09T03:19:46.712Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IPn4Gii / Bullet-LTE Firmware",
          "vendor": "Microhard",
          "versions": [
            {
              "lessThanOrEqual": "v1.2.0-r1132",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFPORTFWD command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFPORTFWD command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-08T21:05:25.706Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-35006/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Microhard Bullet-LTE and IPn4Gii AT+MFPORTFWD Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-35006",
    "datePublished": "2025-06-08T21:05:25.706Z",
    "dateReserved": "2025-04-15T20:40:30.571Z",
    "dateUpdated": "2025-06-09T03:19:46.712Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-35005 (GCVE-0-2025-35005)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:05 – Updated: 2025-06-09 03:20
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFMAC command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
Microhard IPn4Gii / Bullet-LTE Firmware Affected: 0 , ≤ v1.2.0-r1132 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-35005",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T03:20:43.281393Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-09T03:20:54.997Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IPn4Gii / Bullet-LTE Firmware",
          "vendor": "Microhard",
          "versions": [
            {
              "lessThanOrEqual": "v1.2.0-r1132",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFMAC command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFMAC command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-08T21:05:15.936Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-35005/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Microhard Bullet-LTE and IPn4Gii AT+MFMAC Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-35005",
    "datePublished": "2025-06-08T21:05:15.936Z",
    "dateReserved": "2025-04-15T20:40:30.571Z",
    "dateUpdated": "2025-06-09T03:20:54.997Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-35004 (GCVE-0-2025-35004)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:05 – Updated: 2025-06-09 03:22
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
Microhard IPn4Gii / Bullet-LTE Firmware Affected: 0 , ≤ v1.2.0-r1132 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-35004",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T03:22:06.240054Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-09T03:22:14.184Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IPn4Gii / Bullet-LTE Firmware",
          "vendor": "Microhard",
          "versions": [
            {
              "lessThanOrEqual": "v1.2.0-r1132",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-08T21:05:01.219Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-35004/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Microhard Bullet-LTE and IPn4Gii AT+MFIP Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-35004",
    "datePublished": "2025-06-08T21:05:01.219Z",
    "dateReserved": "2025-04-15T20:40:30.571Z",
    "dateUpdated": "2025-06-09T03:22:14.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-32459 (GCVE-0-2025-32459)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:04 – Updated: 2025-06-10 13:22
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
ON Semiconductor Quantenna Wi-Fi chipset Affected: 0 , ≤ 8.0.0.28 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32459",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T03:24:11.770310Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-10T13:22:40.590Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Quantenna Wi-Fi chipset",
          "vendor": "ON Semiconductor",
          "versions": [
            {
              "lessThanOrEqual": "8.0.0.28",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cbr\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
            }
          ],
          "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\n\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-09T18:37:45.430Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-3460"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "ON Semiconductor Quantenna router_command.sh (in the sync_time argument) Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-32459",
    "datePublished": "2025-06-08T21:04:25.317Z",
    "dateReserved": "2025-04-08T23:41:04.753Z",
    "dateUpdated": "2025-06-10T13:22:40.590Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-32458 (GCVE-0-2025-32458)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:04 – Updated: 2025-06-10 13:23
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
ON Semiconductor Quantenna Wi-Fi chipset Affected: 0 , ≤ 8.0.0.28 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32458",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T03:25:16.513260Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-10T13:23:10.764Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Quantenna Wi-Fi chipset",
          "vendor": "ON Semiconductor",
          "versions": [
            {
              "lessThanOrEqual": "8.0.0.28",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cp\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset.\u003c/p\u003e"
            }
          ],
          "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-09T18:39:52.055Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-3460"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "ON Semiconductor Quantenna router_command.sh (in the get_syslog_from_qtn argument) Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-32458",
    "datePublished": "2025-06-08T21:04:12.492Z",
    "dateReserved": "2025-04-08T23:41:04.752Z",
    "dateUpdated": "2025-06-10T13:23:10.764Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-32457 (GCVE-0-2025-32457)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:03 – Updated: 2025-06-10 13:23
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
ON Semiconductor Quantenna Wi-Fi chipset Affected: 0 , ≤ 8.0.0.28 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32457",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T03:27:01.682269Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-10T13:23:32.884Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Quantenna Wi-Fi chipset",
          "vendor": "ON Semiconductor",
          "versions": [
            {
              "lessThanOrEqual": "8.0.0.28",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003c/span\u003e\u003cbr\u003e\u003cp\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset.\u003c/p\u003e"
            }
          ],
          "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7\u00a0(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-09T18:39:03.969Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-3460"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "ON Semiconductor Quantenna router_command.sh (in the get_file_from_qtn argument) Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-32457",
    "datePublished": "2025-06-08T21:03:24.532Z",
    "dateReserved": "2025-04-08T23:41:04.752Z",
    "dateUpdated": "2025-06-10T13:23:32.884Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-32456 (GCVE-0-2025-32456)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:03 – Updated: 2025-06-10 13:24
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
ON Semiconductor Quantenna Wi-Fi chipset Affected: 0 , ≤ 8.0.0.28 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32456",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T03:27:57.822249Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-10T13:24:14.742Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Quantenna Wi-Fi chipset",
          "vendor": "ON Semiconductor",
          "versions": [
            {
              "lessThanOrEqual": "8.0.0.28",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7\u0026nbsp;(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cp\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset.\u003c/p\u003e"
            }
          ],
          "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7\u00a0(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-09T18:39:25.998Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-3460"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "ON Semiconductor Quantenna router_command.sh (in the put_file_to_qtn argument) Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-32456",
    "datePublished": "2025-06-08T21:03:12.814Z",
    "dateReserved": "2025-04-08T23:41:04.752Z",
    "dateUpdated": "2025-06-10T13:24:14.742Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-32455 (GCVE-0-2025-32455)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:02 – Updated: 2025-06-09 18:38
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
ON Semiconductor Quantenna Wi-Fi chipset Affected: 0 , ≤ 8.0.0.28 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32455",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T15:01:33.594336Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-09T15:01:41.914Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Quantenna Wi-Fi chipset",
          "vendor": "ON Semiconductor",
          "versions": [
            {
              "lessThanOrEqual": "8.0.0.28",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cbr\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
            }
          ],
          "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\n\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-09T18:38:09.297Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-3460"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "ON Semiconductor Quantenna router_command.sh (in the run_cmd argument) Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-32455",
    "datePublished": "2025-06-08T21:02:58.816Z",
    "dateReserved": "2025-04-08T23:41:04.752Z",
    "dateUpdated": "2025-06-09T18:38:09.297Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-3461 (GCVE-0-2025-3461)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:02 – Updated: 2025-06-09 18:37
VLAI?
Summary
The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, "Missing Authentication for Critical Function," and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
AHA
Impacted products
Vendor Product Version
ON Semiconductor Quantenna Wi-Fi chipset Affected: 0 , ≤ 8.0.0.28 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-3461",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T15:02:18.870403Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-09T15:02:24.532Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Quantenna Wi-Fi chipset",
          "vendor": "ON Semiconductor",
          "versions": [
            {
              "lessThanOrEqual": "8.0.0.28",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, \"Missing Authentication for Critical Function,\" and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cp\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset.\u003c/p\u003e"
            }
          ],
          "value": "The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, \"Missing Authentication for Critical Function,\" and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-09T18:37:14.718Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-3461/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "ON Semiconductor Quantenna Telnet Missing Authentication",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-3461",
    "datePublished": "2025-06-08T21:02:37.521Z",
    "dateReserved": "2025-04-08T23:41:09.376Z",
    "dateUpdated": "2025-06-09T18:37:14.718Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-3460 (GCVE-0-2025-3460)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:02 – Updated: 2025-06-09 18:33
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
ON Semiconductor Quantenna Wi-Fi chipset Affected: 0 , ≤ 8.0.0.28 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-3460",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T15:02:58.903057Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-09T15:03:04.372Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Quantenna Wi-Fi chipset",
          "vendor": "ON Semiconductor",
          "versions": [
            {
              "lessThanOrEqual": "8.0.0.28",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7\u0026nbsp;(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cp\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset.\u003c/p\u003e"
            }
          ],
          "value": "The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7\u00a0(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-09T18:33:57.925Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-3460"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "ON Semiconductor Quantenna set_tx_pow Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-3460",
    "datePublished": "2025-06-08T21:02:24.334Z",
    "dateReserved": "2025-04-08T23:41:08.314Z",
    "dateUpdated": "2025-06-09T18:33:57.925Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-3459 (GCVE-0-2025-3459)

Vulnerability from cvelistv5 – Published: 2025-06-08 21:02 – Updated: 2025-06-09 18:36
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
AHA
Impacted products
Vendor Product Version
ON Semiconductor Quantenna Wi-Fi chipset Affected: 0 , ≤ 8.0.0.28 (custom)
Create a notification for this product.
Credits
Ricky "HeadlessZeke" Lawshae of Keysight todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-3459",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-09T15:03:20.052450Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-09T15:03:25.025Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Quantenna Wi-Fi chipset",
          "vendor": "ON Semiconductor",
          "versions": [
            {
              "lessThanOrEqual": "8.0.0.28",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-06-08T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cp\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset.\u003c/p\u003e"
            }
          ],
          "value": "The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-09T18:36:35.345Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-3459"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "ON Semiconductor Quantenna transmit_file Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-3459",
    "datePublished": "2025-06-08T21:02:09.918Z",
    "dateReserved": "2025-04-08T23:41:07.346Z",
    "dateUpdated": "2025-06-09T18:36:35.345Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2894 (GCVE-0-2025-2894)

Vulnerability from cvelistv5 – Published: 2025-03-28 02:51 – Updated: 2025-04-03 14:37
VLAI?
Summary
The Go1 also known as "The World's First Intelligence Bionic Quadruped Robot Companion of Consumer Level," contains an undocumented backdoor that can enable the manufacturer, and anyone in possession of the correct API key, complete remote control over the affected robotic device using the CloudSail remote access service.
CWE
Assigner
AHA
Impacted products
Vendor Product Version
Unitree Go1 Affected: 2022_05_11_e0d0e617
Create a notification for this product.
Credits
Andreas Makris Kevin Finisterre todb
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2894",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-28T15:40:56.582769Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-28T15:41:30.159Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Go1",
          "vendor": "Unitree",
          "versions": [
            {
              "status": "affected",
              "version": "2022_05_11_e0d0e617"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Andreas Makris"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Kevin Finisterre"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "todb"
        }
      ],
      "datePublic": "2025-03-28T00:53:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Go1\u0026nbsp;also known as \"The World\u0027s First Intelligence Bionic Quadruped Robot Companion of Consumer Level,\" contains an undocumented backdoor that can enable the manufacturer, and anyone in possession of the correct API key, complete remote control over the affected robotic device using the CloudSail remote access service.\u003cbr\u003e"
            }
          ],
          "value": "The Go1\u00a0also known as \"The World\u0027s First Intelligence Bionic Quadruped Robot Companion of Consumer Level,\" contains an undocumented backdoor that can enable the manufacturer, and anyone in possession of the correct API key, complete remote control over the affected robotic device using the CloudSail remote access service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-912",
              "description": "CWE-912: Hidden Functionality",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-03T14:37:08.450Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "technical-description"
          ],
          "url": "https://github.com/MAVProxyUser/YushuTechUnitreeGo1/blob/main/Unitree_report.pdf"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://x.com/d0tslash/status/1730989109332607208"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://github.com/unitreerobotics/unitree_ros/issues/120"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/cve-2025-2894/"
        },
        {
          "tags": [
            "media-coverage"
          ],
          "url": "https://www.axios.com/2025/04/01/threat-spotlight-backdoor-in-chinese-robots-future-of-cybersecurity"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Unitree Go1 Robot Dog Backdoor Control Channel",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2025-2894",
    "datePublished": "2025-03-28T02:51:19.768Z",
    "dateReserved": "2025-03-28T00:53:27.892Z",
    "dateUpdated": "2025-04-03T14:37:08.450Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-4224 (GCVE-0-2024-4224)

Vulnerability from cvelistv5 – Published: 2024-07-15 20:34 – Updated: 2024-08-01 20:33
VLAI?
Summary
An authenticated stored cross-site scripting (XSS) exists in the TP-Link TL-SG1016DE affecting version TL-SG1016DE(UN) V7.6_1.0.0 Build 20230616, which could allow an adversary to run JavaScript in an administrator's browser. This issue was fixed in TL-SG1016DE(UN) V7_1.0.1 Build 20240628.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
AHA
Impacted products
Vendor Product Version
TP-Link TL-SG1016DE Affected: 0 , ≤ V7.6_1.0.0 Build 20230616 (custom)
Create a notification for this product.
Credits
73x45!!!!! s3rv1c3_w34p0n_r34ch3r Austin Hackers Anonymous!
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:tp-link:tl-sg1016de:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "tl-sg1016de",
            "vendor": "tp-link",
            "versions": [
              {
                "status": "affected",
                "version": "7.6_1.0.0build20230616"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "LOW",
              "scope": "CHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-4224",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-16T13:11:06.702298Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-16T13:22:39.852Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:33:53.018Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://takeonme.org/cves/CVE-2024-4224.html"
          },
          {
            "tags": [
              "patch",
              "x_transferred"
            ],
            "url": "https://www.tp-link.com/en/support/download/tl-sg1016de/v7/#Firmware"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "TL-SG1016DE",
          "vendor": "TP-Link",
          "versions": [
            {
              "lessThanOrEqual": "V7.6_1.0.0 Build 20230616",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "73x45!!!!!"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "s3rv1c3_w34p0n_r34ch3r"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "Austin Hackers Anonymous!"
        }
      ],
      "datePublic": "2024-07-15T18:37:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An authenticated stored cross-site scripting (XSS) exists in the TP-Link TL-SG1016DE affecting version TL-SG1016DE(UN) V7.6_1.0.0 Build 20230616, which could allow an adversary to run JavaScript in an administrator\u0027s browser. This issue was fixed in\u0026nbsp;TL-SG1016DE(UN) V7_1.0.1 Build 20240628.\u003cbr\u003e"
            }
          ],
          "value": "An authenticated stored cross-site scripting (XSS) exists in the TP-Link TL-SG1016DE affecting version TL-SG1016DE(UN) V7.6_1.0.0 Build 20230616, which could allow an adversary to run JavaScript in an administrator\u0027s browser. This issue was fixed in\u00a0TL-SG1016DE(UN) V7_1.0.1 Build 20240628."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-15T20:34:53.699Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/CVE-2024-4224.html"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://www.tp-link.com/en/support/download/tl-sg1016de/v7/#Firmware"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "TP-Link TL-SG1016DE XSS",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2024-4224",
    "datePublished": "2024-07-15T20:34:53.699Z",
    "dateReserved": "2024-04-26T00:34:22.437Z",
    "dateUpdated": "2024-08-01T20:33:53.018Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-2056 (GCVE-0-2024-2056)

Vulnerability from cvelistv5 – Published: 2024-03-05 18:57 – Updated: 2025-02-13 17:32
VLAI?
Summary
Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov's 'tailon' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.
CWE
  • CWE-288 - Authentication Bypass Using an Alternate Path or Channel
  • CWE-552 - Files or Directories Accessible to External Parties
Assigner
AHA
Impacted products
Credits
Jim Becher of KoreLogic, Inc. Jaggar Henry of KoreLogic, Inc.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T19:03:38.787Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt"
          },
          {
            "tags": [
              "related",
              "x_transferred"
            ],
            "url": "https://github.com/gvalkov/tailon#security"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2024/Mar/14"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:articatech:artica_proxy:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "artica_proxy",
            "vendor": "articatech",
            "versions": [
              {
                "status": "affected",
                "version": "4.50"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-2056",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-23T20:29:37.739652Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-23T20:31:03.176Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Artica Proxy",
          "vendor": "Artica Tech",
          "versions": [
            {
              "status": "affected",
              "version": "4.50"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Jim Becher of KoreLogic, Inc."
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Jaggar Henry of KoreLogic, Inc."
        }
      ],
      "datePublic": "2024-03-05T18:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the \"tailon\" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at \u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003egvalkov\u0027s \u0027tailon\u0027 GitHub repo\u003c/span\u003e. Using the tailon service, the contents of any file on the Artica Proxy can be viewed."
            }
          ],
          "value": "Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the \"tailon\" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov\u0027s \u0027tailon\u0027 GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-288",
              "description": "CWE-288 Authentication Bypass Using an Alternate Path or Channel",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-552",
              "description": "CWE-552 Files or Directories Accessible to External Parties",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-05T19:00:13.860Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://github.com/gvalkov/tailon#security"
        },
        {
          "url": "http://seclists.org/fulldisclosure/2024/Mar/14"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Artica Proxy Loopback Services Remotely Accessible Unauthenticated",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2024-2056",
    "datePublished": "2024-03-05T18:57:03.524Z",
    "dateReserved": "2024-03-01T02:03:12.654Z",
    "dateUpdated": "2025-02-13T17:32:34.912Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-2055 (GCVE-0-2024-2055)

Vulnerability from cvelistv5 – Published: 2024-03-05 18:56 – Updated: 2025-02-13 17:32
VLAI?
Summary
The "Rich Filemanager" feature of Artica Proxy provides a web-based interface for file management capabilities. When the feature is enabled, it does not require authentication by default, and runs as the root user.
CWE
  • CWE-288 - Authentication Bypass Using an Alternate Path or Channel
  • CWE-552 - Files or Directories Accessible to External Parties
Assigner
AHA
Impacted products
Vendor Product Version
Artica Tech Artica Proxy Affected: 4.50
Affected: 4.40
Create a notification for this product.
Credits
Jim Becher of KoreLogic, Inc.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T19:03:38.319Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-003.txt"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2024/Mar/13"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:articatech:artica_proxy:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "artica_proxy",
            "vendor": "articatech",
            "versions": [
              {
                "status": "affected",
                "version": "4.50"
              },
              {
                "status": "affected",
                "version": "4.40"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-2055",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-26T15:57:01.965216Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-26T15:57:07.088Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Artica Proxy",
          "vendor": "Artica Tech",
          "versions": [
            {
              "status": "affected",
              "version": "4.50"
            },
            {
              "status": "affected",
              "version": "4.40"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Jim Becher of KoreLogic, Inc."
        }
      ],
      "datePublic": "2024-03-05T18:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The \"Rich Filemanager\" feature of Artica Proxy provides a web-based interface for file management capabilities. When the feature is enabled, it does not require authentication by default, and runs as the root user."
            }
          ],
          "value": "The \"Rich Filemanager\" feature of Artica Proxy provides a web-based interface for file management capabilities. When the feature is enabled, it does not require authentication by default, and runs as the root user."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-288",
              "description": "CWE-288 Authentication Bypass Using an Alternate Path or Channel",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-552",
              "description": "CWE-552 Files or Directories Accessible to External Parties",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-05T19:00:12.694Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-003.txt"
        },
        {
          "url": "http://seclists.org/fulldisclosure/2024/Mar/13"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Artica Proxy Unauthenticated File Manager Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2024-2055",
    "datePublished": "2024-03-05T18:56:33.232Z",
    "dateReserved": "2024-03-01T02:03:10.598Z",
    "dateUpdated": "2025-02-13T17:32:34.287Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-2054 (GCVE-0-2024-2054)

Vulnerability from cvelistv5 – Published: 2024-03-05 18:56 – Updated: 2025-02-13 17:32
VLAI?
Summary
The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user.
CWE
  • CWE-502 - Deserialization of Untrusted Data
Assigner
AHA
Impacted products
Credits
Jaggar Henry of KoreLogic, Inc.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T19:03:38.336Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-002.txt"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2024/Mar/12"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:articatech:artica_proxy:4.50:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "artica_proxy",
            "vendor": "articatech",
            "versions": [
              {
                "status": "affected",
                "version": "4.50"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-2054",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-05T19:55:54.403524Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:57:58.912Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Artica Proxy",
          "vendor": "Artica Tech",
          "versions": [
            {
              "status": "affected",
              "version": "4.50"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Jaggar Henry of KoreLogic, Inc."
        }
      ],
      "datePublic": "2024-03-05T18:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the \"www-data\" user."
            }
          ],
          "value": "The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the \"www-data\" user."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502 Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-05T19:00:11.581Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-002.txt"
        },
        {
          "url": "http://seclists.org/fulldisclosure/2024/Mar/12"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Artica Proxy Unauthenticated PHP Deserialization Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2024-2054",
    "datePublished": "2024-03-05T18:56:22.972Z",
    "dateReserved": "2024-03-01T02:03:08.129Z",
    "dateUpdated": "2025-02-13T17:32:33.640Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-2053 (GCVE-0-2024-2053)

Vulnerability from cvelistv5 – Published: 2024-03-05 18:56 – Updated: 2025-02-13 17:32
VLAI?
Summary
The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user.
CWE
  • CWE-23 - Relative Path Traversal
Assigner
AHA
Impacted products
Vendor Product Version
Artica Tech Artica Proxy Affected: 4.50
Affected: 4.40
Create a notification for this product.
Credits
Jaggar Henry of KoreLogic, Inc.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T19:03:38.417Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-001.txt"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2024/Mar/11"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:articatech:artica_proxy:4.50:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "artica_proxy",
            "vendor": "articatech",
            "versions": [
              {
                "status": "affected",
                "version": "4.50"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:articatech:artica_proxy:4.40:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "artica_proxy",
            "vendor": "articatech",
            "versions": [
              {
                "status": "affected",
                "version": "4.40"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-2053",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-06T14:50:53.590592Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:57:43.547Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Artica Proxy",
          "vendor": "Artica Tech",
          "versions": [
            {
              "status": "affected",
              "version": "4.50"
            },
            {
              "status": "affected",
              "version": "4.40"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Jaggar Henry of KoreLogic, Inc."
        }
      ],
      "datePublic": "2024-03-05T18:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the \"www-data\" user. This issue was demonstrated on version 4.50 of the\u0026nbsp;The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the \"www-data\" user.\u003cbr\u003e"
            }
          ],
          "value": "The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the \"www-data\" user. This issue was demonstrated on version 4.50 of the\u00a0The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the \"www-data\" user."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-23",
              "description": "CWE-23 Relative Path Traversal",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-05T19:00:10.450Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-001.txt"
        },
        {
          "url": "http://seclists.org/fulldisclosure/2024/Mar/11"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Artica Proxy Unauthenticated LFI Protection Bypass Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2024-2053",
    "datePublished": "2024-03-05T18:56:10.796Z",
    "dateReserved": "2024-03-01T02:03:05.828Z",
    "dateUpdated": "2025-02-13T17:32:33.055Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5841 (GCVE-0-2023-5841)

Vulnerability from cvelistv5 – Published: 2024-02-01 18:28 – Updated: 2025-11-04 16:10
VLAI?
Summary
Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability. This issue was resolved as of versions v3.2.2 and v3.1.12 of the affected library.
CWE
  • CWE-122 - Heap-based Buffer Overflow
Assigner
AHA
Impacted products
Vendor Product Version
Academy Software Foundation OpenEXR Affected: 0 , ≤ 3.2.1 (semver)
Unaffected: 3.2.2
Unaffected: 3.1.12
Create a notification for this product.
Credits
zenofex WanderingGlitch Austin Hackers Anonymous!
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-04T16:10:52.466Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://takeonme.org/cves/CVE-2023-5841.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSB6DB5LAKGPLRXEF5HDNGUMT7GIFT2C/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWMINVKQLSUHECXBSQMZFCSDRIHFOJJI/"
          },
          {
            "url": "http://seclists.org/fulldisclosure/2024/Sep/36"
          },
          {
            "url": "http://seclists.org/fulldisclosure/2024/Sep/34"
          },
          {
            "url": "http://seclists.org/fulldisclosure/2024/Sep/32"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 9.1,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-5841",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-15T15:17:50.765495Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-15T15:18:17.317Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "OpenEXR",
          "vendor": "Academy Software Foundation",
          "versions": [
            {
              "lessThanOrEqual": "3.2.1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "3.2.2"
            },
            {
              "status": "unaffected",
              "version": "3.1.12"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "zenofex"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "WanderingGlitch"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Austin Hackers Anonymous!"
        }
      ],
      "datePublic": "2024-01-31T22:35:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX\u0026nbsp;image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability. This issue was resolved as of versions\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ev3.2.2 and v3.1.12 of the affected library.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX\u00a0image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability. This issue was resolved as of versions\u00a0v3.2.2 and v3.1.12 of the affected library."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "CWE-122: Heap-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-25T02:06:23.585Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "url": "https://takeonme.org/cves/CVE-2023-5841.html"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSB6DB5LAKGPLRXEF5HDNGUMT7GIFT2C/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWMINVKQLSUHECXBSQMZFCSDRIHFOJJI/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "OpenEXR Heap Overflow in Scanline Deep Data Parsing",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2023-5841",
    "datePublished": "2024-02-01T18:28:05.892Z",
    "dateReserved": "2023-10-29T23:41:19.153Z",
    "dateUpdated": "2025-11-04T16:10:52.466Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2023-4504 (GCVE-0-2023-4504)

Vulnerability from cvelistv5 – Published: 2023-09-21 22:47 – Updated: 2025-11-04 16:10
VLAI?
Summary
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
CWE
  • CWE-122 - Heap-based Buffer Overflow
Assigner
AHA
Impacted products
Vendor Product Version
OpenPrinting CUPS Affected: 0 , < 2.4.6 (semver)
Create a notification for this product.
Credits
zenofex WanderingGlitch Austin Hackers Anonymous!
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-04T16:10:38.138Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "technical-description",
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://takeonme.org/cves/CVE-2023-4504.html"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h"
          },
          {
            "tags": [
              "release-notes",
              "x_transferred"
            ],
            "url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/"
          },
          {
            "url": "http://seclists.org/fulldisclosure/2024/Sep/33"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-4504",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-23T13:29:05.900883Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-23T16:16:13.304Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CUPS",
          "vendor": "OpenPrinting",
          "versions": [
            {
              "lessThan": "2.4.6",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "libppd",
          "vendor": "OpenPrinting",
          "versions": [
            {
              "lessThan": "d09348b",
              "status": "affected",
              "version": "0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "zenofex"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "WanderingGlitch"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Austin Hackers Anonymous!"
        }
      ],
      "datePublic": "2023-09-20T12:35:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDue to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "CWE-122 Heap-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-07T02:06:38.717Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "technical-description",
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/CVE-2023-4504.html"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.7"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "OpenPrinting CUPS/libppd Postscript Parsing Heap Overflow",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2023-4504",
    "datePublished": "2023-09-21T22:47:41.879Z",
    "dateReserved": "2023-08-23T21:14:04.183Z",
    "dateUpdated": "2025-11-04T16:10:38.138Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2023-2906 (GCVE-0-2023-2906)

Vulnerability from cvelistv5 – Published: 2023-08-25 20:41 – Updated: 2025-11-03 21:47
VLAI?
Summary
Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.
Severity ?
No CVSS data available.
CWE
Assigner
AHA
Impacted products
Vendor Product Version
Wireshark Foundation Wireshark Affected: 2.0.0 , ≤ 4.0.7 (semver)
Create a notification for this product.
Credits
zenofex WanderingGlitch AHA!
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T21:47:44.937Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "exploit",
              "third-party-advisory",
              "technical-description",
              "x_transferred"
            ],
            "url": "https://takeonme.org/cves/CVE-2023-2906.html"
          },
          {
            "tags": [
              "patch",
              "x_transferred"
            ],
            "url": "https://gitlab.com/wireshark/wireshark/-/issues/19229"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-2906",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T14:36:28.624729Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T14:37:16.471Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Wireshark",
          "vendor": "Wireshark Foundation",
          "versions": [
            {
              "lessThanOrEqual": "4.0.7",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "zenofex"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "WanderingGlitch"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "AHA!"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDue to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-369",
              "description": "CWE-369 Divide By Zero",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-15T21:06:18.829Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "exploit",
            "third-party-advisory",
            "technical-description"
          ],
          "url": "https://takeonme.org/cves/CVE-2023-2906.html"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://gitlab.com/wireshark/wireshark/-/issues/19229"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Wireshark CP2179 divide by zero",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2023-2906",
    "datePublished": "2023-08-25T20:41:19.403Z",
    "dateReserved": "2023-05-26T00:46:14.391Z",
    "dateUpdated": "2025-11-03T21:47:44.937Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2023-2905 (GCVE-0-2023-2905)

Vulnerability from cvelistv5 – Published: 2023-08-09 04:46 – Updated: 2024-10-10 14:56
VLAI?
Summary
Due to a failure in validating the length of a provided MQTT_CMD_PUBLISH parsed message with a variable length header, Cesanta Mongoose, an embeddable web server, version 7.10 is susceptible to a heap-based buffer overflow vulnerability in the default configuration. Version 7.9 and prior does not appear to be vulnerable. This issue is resolved in version 7.11.
Severity ?
No CVSS data available.
CWE
  • CWE-122 - Heap-based Buffer Overflow
Assigner
AHA
Impacted products
Vendor Product Version
Cesanta Mongoose Affected: 7.10
Unaffected: 7.11
Create a notification for this product.
Credits
zenofex WanderingGlitch
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:41:03.925Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "technical-description",
              "exploit",
              "x_transferred"
            ],
            "url": "https://takeonme.org/cves/CVE-2023-2905.html"
          },
          {
            "tags": [
              "patch",
              "x_transferred"
            ],
            "url": "https://github.com/cesanta/mongoose/pull/2274"
          },
          {
            "tags": [
              "release-notes",
              "x_transferred"
            ],
            "url": "https://github.com/cesanta/mongoose/releases/tag/7.11"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-2905",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-10T14:56:20.113651Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-10T14:56:29.619Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Mongoose",
          "vendor": "Cesanta",
          "versions": [
            {
              "status": "affected",
              "version": "7.10"
            },
            {
              "status": "unaffected",
              "version": "7.11"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "zenofex"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "WanderingGlitch"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDue to a failure in validating the length of a provided MQTT_CMD_PUBLISH\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eparsed message with a variable length header, Cesanta Mongoose, an\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eembeddable web server, version 7.10 is \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003esusceptible to a heap-based buffer overflow vulnerability in the default configuration. \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVersion 7.9 and prior does not appear to be vulnerable. This issue is resolved in version 7.11.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "Due to a failure in validating the length of a provided MQTT_CMD_PUBLISH\u00a0parsed message with a variable length header, Cesanta Mongoose, an\u00a0embeddable web server, version 7.10 is susceptible to a heap-based buffer overflow vulnerability in the default configuration. Version 7.9 and prior does not appear to be vulnerable. This issue is resolved in version 7.11.\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "CWE-122 Heap-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-09T04:46:14.972Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory",
            "technical-description",
            "exploit"
          ],
          "url": "https://takeonme.org/cves/CVE-2023-2905.html"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/cesanta/mongoose/pull/2274"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://github.com/cesanta/mongoose/releases/tag/7.11"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Cesanta Mongoose MQTT Message Parsing Heap Overflow",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2023-2905",
    "datePublished": "2023-08-09T04:46:14.972Z",
    "dateReserved": "2023-05-26T00:46:11.667Z",
    "dateUpdated": "2024-10-10T14:56:29.619Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-0667 (GCVE-0-2023-0667)

Vulnerability from cvelistv5 – Published: 2023-06-07 02:38 – Updated: 2025-11-03 21:47
VLAI?
Summary
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark
CWE
  • CWE-122 - Heap-based Buffer Overflow
Assigner
AHA
Impacted products
Vendor Product Version
Wireshark Foundation Wireshark Affected: 0 , ≤ 4.0.5 (semver)
Unaffected: 4.0.6
Affected: 0 , ≤ 3.6.13 (semver)
Unaffected: 3.6.14
Create a notification for this product.
Credits
zenofex WanderingGlitch Austin Hackers Anonymous!
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T21:47:02.095Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://takeonme.org/cves/CVE-2023-0667.html"
          },
          {
            "tags": [
              "issue-tracking",
              "x_transferred"
            ],
            "url": "https://gitlab.com/wireshark/wireshark/-/issues/19086"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202309-02"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-0667",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-06T20:51:10.713632Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-06T20:52:20.014Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Wireshark",
          "vendor": "Wireshark Foundation",
          "versions": [
            {
              "lessThanOrEqual": "4.0.5",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "4.0.6"
            },
            {
              "lessThanOrEqual": "3.6.13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "3.6.14"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "zenofex"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "WanderingGlitch"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Austin Hackers Anonymous!"
        }
      ],
      "datePublic": "2023-05-22T19:04:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark"
            }
          ],
          "value": "Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "CWE-122 Heap-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-17T06:06:23.905Z",
        "orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
        "shortName": "AHA"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://takeonme.org/cves/CVE-2023-0667.html"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://gitlab.com/wireshark/wireshark/-/issues/19086"
        },
        {
          "url": "https://security.gentoo.org/glsa/202309-02"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Wireshark MSMMS parsing buffer overflow",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
    "assignerShortName": "AHA",
    "cveId": "CVE-2023-0667",
    "datePublished": "2023-06-07T02:38:07.798Z",
    "dateReserved": "2023-02-03T22:08:34.816Z",
    "dateUpdated": "2025-11-03T21:47:02.095Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}