Back to Blog
Ricoh is aware of these vulnerabilities disclosed by VMware:ĬVE-2022-22963, a remote code execution in Spring Cloud Function by malicious Spring Expression Ricoh is quickly working on updated firmware for each model, and more information will be provided as soon as it is made available. Ricoh encourages all customers who use the RICOH M C240FW and RICOH P C200W to visit this webpage and follow the workaround steps outlined for each model to ensure security.įor customers who use the RICOH M C550SRF, please disable the Web-Services service on the printer (TCP port 65002), which blocks the ability to exploit this vulnerability, by performing the following steps: Go to “Settings” > ”Network/Ports” > “TCP/IP” > “TCP/IP Port Access” and uncheck "TCP 65002 (WSD Print Service)” and save. Ricoh understands the importance of security and is committed to managing its products and services with the most advanced security technologies possible for customers around the world. ![]() Ricoh has already taken steps to address the vulnerability of impacted devices, listed here. Ricoh is aware of CVE-2023-23560, a Server-Side Request Forgery (SSRF) vulnerability that could potentially be leveraged by an attacker to remotely execute arbitrary code on an affected device. ![]() ![]() A Server-Side Request Forgery (SSRF) vulnerability exists in some Ricoh devices.
0 Comments
Read More
Leave a Reply. |