CVE-2024-51980

MEDIUM

WS-Addressing ReplyTo - SSRF

Title source: llm
STIX 2.1

Description

An unauthenticated attacker may perform a limited server side request forgery (SSRF), forcing the target device to open a TCP connection to an arbitrary port number on an arbitrary IP address. This SSRF leverages the WS-Addressing ReplyTo element in a Web service (HTTP TCP port 80) SOAP request. The attacker can not control the data sent in the SSRF connection, nor can the attacker receive any data back. This SSRF is suitable for TCP port scanning of an internal network when the Web service (HTTP TCP port 80) is exposed across a network segment.

Scores

CVSS v3 5.3
EPSS 0.0063
EPSS Percentile 70.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-918
Status published
Products (50)
Brother Industries, Ltd/ADS-2400N < T
Brother Industries, Ltd/ADS-2800W < T
Brother Industries, Ltd/ADS-3000N < T
Brother Industries, Ltd/ADS-3600W < T
Brother Industries, Ltd/DCP-1610W < ZB
Brother Industries, Ltd/DCP-1610WE < ZB
Brother Industries, Ltd/DCP-1610WR < ZB
Brother Industries, Ltd/DCP-1612W < ZB
Brother Industries, Ltd/DCP-1612WE < ZB
Brother Industries, Ltd/DCP-1612WR < ZB
... and 40 more
Published Jun 25, 2025
Tracked Since Feb 18, 2026