Security Alerts
Ricoh understands the importance of security and is committed to managing our products and services with the most advanced security technologies available for our customers
We constantly evaluate our products and will update this section whenever new vulnerabilities are identified.
- Java Support Ending for Ricoh software products running on Java VM on MFP/LP - 31st March 2025
- Specific Ricoh MFP and Printer Products - a server-side request forgery vulnerability(CVE-2023-50733) , a firmware downgrade prevention vulnerability(CVE-2023-50738) and a buffer overflow vulnerability(CVE-2023-50739)
- Specific Ricoh MFP and Printer Products - Session Management Vulnerability (CVE-2024-21824)
- Vulnerabilities in the PostScript interpreter(CVE-2023-50734, CVE-2023-50735, CVE-2023-50736) and an input validation vulnerability in the SE Menu(CVE-2023-50737) towards Ricoh products
- Notice on potential impact of a heap buffer overflow vulnerability in libwebp / libvpx towards Ricoh products and services
- Notice on potential impact of "Apache ActiveMQ remote code execution vulnerability" (CVE-2023-46604) towards Ricoh products and services
- Notice of security investigation: "Vulnerability of SLP (Service Location Protocol) implementation that allows reflected DoS attacks via UDP" (CVE-2023-29552)
- Update (Added eight vulnerabilities): A Server-Side Request Forgery vulnerability
- A Server-Side Request Forgery vulnerability
- Notice elevation of administrator privileges vulnerability in Printer Driver Packager NX.