Security Alerts
Ricoh understands the importance of security and is committed to managing our products and services with the most advanced security technologies available for our customers
We constantly evaluate our products and will update this section whenever new vulnerabilities are identified.
- Specific Ricoh MFP and Printer Products - a server-side request forgery vulnerability(CVE-2023-50733) , a firmware downgrade prevention vulnerability(CVE-2023-50738) and a buffer overflow vulnerability(CVE-2023-50739)
- Specific Ricoh MFP and Printer Products - Session Management Vulnerability (CVE-2024-21824)
- Vulnerabilities in the PostScript interpreter(CVE-2023-50734, CVE-2023-50735, CVE-2023-50736) and an input validation vulnerability in the SE Menu(CVE-2023-50737) towards Ricoh products
- Notice on potential impact of a heap buffer overflow vulnerability in libwebp / libvpx towards Ricoh products and services
- Notice on potential impact of "Apache ActiveMQ remote code execution vulnerability" (CVE-2023-46604) towards Ricoh products and services
- Notice of security investigation: "Vulnerability of SLP (Service Location Protocol) implementation that allows reflected DoS attacks via UDP" (CVE-2023-29552)
- Update (Added eight vulnerabilities): A Server-Side Request Forgery vulnerability
- Notice elevation of administrator privileges vulnerability in Printer Driver Packager NX.
- A Server-Side Request Forgery vulnerability
- Notice of security investigation: Vulnerability (CVE-2022-43969) towards scanner or FAX-installed Ricoh products that may cause folder user password breach