An unauthenticated attacker may perform a limited server side request forgery (SSRF), forcing the target device to open a TCP connection to an arbitrary port number on an arbitrary IP address. This SSRF leverages the WS-Addressing ReplyTo element in a Web service (HTTP TCP port 80) SOAP request. The attacker can not control the data sent in the SSRF connection, nor can the attacker receive any data back. This SSRF is suitable for TCP port scanning of an internal network when the Web service (HTTP TCP port 80) is exposed across a network segment.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Jun 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Unauthenticated Server Side Request Forgery (SSRF) via WS-Addressing affecting multiple models from Brother Industries, Ltd, FUJIFILM Business Innovation, RICOH, and Toshiba Tec. | Unauthenticated Server Side Request Forgery (SSRF) via WS-Addressing affecting multiple models from Brother Industries, Ltd, FUJIFILM Business Innovation, Ricoh, Toshiba Tec, and Konica Minolta, Inc. |
References |
|
Wed, 25 Jun 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 25 Jun 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthenticated attacker may perform a limited server side request forgery (SSRF), forcing the target device to open a TCP connection to an arbitrary port number on an arbitrary IP address. This SSRF leverages the WS-Addressing ReplyTo element in a Web service (HTTP TCP port 80) SOAP request. The attacker can not control the data sent in the SSRF connection, nor can the attacker receive any data back. This SSRF is suitable for TCP port scanning of an internal network when the Web service (HTTP TCP port 80) is exposed across a network segment. | |
Title | Unauthenticated Server Side Request Forgery (SSRF) via WS-Addressing affecting multiple models from Brother Industries, Ltd, FUJIFILM Business Innovation, RICOH, and Toshiba Tec. | |
Weaknesses | CWE-918 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: rapid7
Published: 2025-06-25T07:22:04.783Z
Updated: 2025-06-25T14:10:31.201Z
Reserved: 2024-11-04T17:19:18.809Z
Link: CVE-2024-51980

Updated: 2025-06-25T12:29:13.589Z

Status : Awaiting Analysis
Published: 2025-06-25T08:15:31.930
Modified: 2025-06-26T18:58:14.280
Link: CVE-2024-51980

No data.