Vulnerabilites related to ricoh - sp_c252sf
CVE-2021-33945 (GCVE-0-2021-33945)
Vulnerability from cvelistv5
Published
2022-02-15 19:08
Modified
2024-08-04 00:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:05:52.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh.com/info/2022/0228_1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-03T01:10:31", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh.com/info/2022/0228_1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-33945", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1", "refsource": "MISC", "url": "https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1" }, { "name": "https://www.ricoh.com/info/2022/0228_1/", "refsource": "MISC", "url": "https://www.ricoh.com/info/2022/0228_1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-33945", "datePublished": "2022-02-15T19:08:26", "dateReserved": "2021-06-07T00:00:00", "dateUpdated": "2024-08-04T00:05:52.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14299 (GCVE-0-2019-14299)
Vulnerability from cvelistv5
Published
2020-03-13 18:50
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-13T18:50:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14299", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh-usa.com/en/support-and-download", "refsource": "MISC", "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "name": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/", "refsource": "MISC", "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14299", "datePublished": "2020-03-13T18:50:21", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14303 (GCVE-0-2019-14303)
Vulnerability from cvelistv5
Published
2020-03-13 18:49
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-13T18:49:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14303", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh-usa.com/en/support-and-download", "refsource": "MISC", "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "name": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/", "refsource": "MISC", "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14303", "datePublished": "2020-03-13T18:49:00", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14301 (GCVE-0-2019-14301)
Vulnerability from cvelistv5
Published
2020-01-10 18:00
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2).
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-25T04:06:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14301", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "CONFIRM", "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14301", "datePublished": "2020-01-10T18:00:09", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14305 (GCVE-0-2019-14305)
Vulnerability from cvelistv5
Published
2019-08-26 14:19
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.376Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#11708203", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:U/UI:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-13T04:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#11708203", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14305", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:U/UI:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh-usa.com/en/support-and-download", "refsource": "MISC", "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "name": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "MISC", "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#11708203", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14305", "datePublished": "2019-08-26T14:19:54", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.376Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14310 (GCVE-0-2019-14310)
Vulnerability from cvelistv5
Published
2020-03-13 18:45
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-13T18:45:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14310", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh-usa.com/en/support-and-download", "refsource": "MISC", "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "name": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/", "refsource": "MISC", "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14310", "datePublished": "2020-03-13T18:45:22", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14306 (GCVE-0-2019-14306)
Vulnerability from cvelistv5
Published
2020-01-10 17:59
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2).
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.342Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-25T04:06:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14306", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "CONFIRM", "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14306", "datePublished": "2020-01-10T17:59:24", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.342Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14300 (GCVE-0-2019-14300)
Vulnerability from cvelistv5
Published
2019-08-26 14:22
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#11708203", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-13T04:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#11708203", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14300", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh-usa.com/en/support-and-download", "refsource": "MISC", "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "name": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "MISC", "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#11708203", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14300", "datePublished": "2019-08-26T14:22:06", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14308 (GCVE-0-2019-14308)
Vulnerability from cvelistv5
Published
2019-08-26 13:28
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the LPD service. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.376Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#11708203", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the LPD service. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-13T04:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#11708203", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the LPD service. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh-usa.com/en/support-and-download", "refsource": "MISC", "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "name": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "MISC", "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#11708203", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14308", "datePublished": "2019-08-26T13:28:30", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.376Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14307 (GCVE-0-2019-14307)
Vulnerability from cvelistv5
Published
2019-08-26 14:18
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.520Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#11708203", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:U/UI:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-13T04:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#11708203", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:U/UI:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh-usa.com/en/support-and-download", "refsource": "MISC", "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "name": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "MISC", "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#11708203", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14307", "datePublished": "2019-08-26T14:18:04", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14309 (GCVE-0-2019-14309)
Vulnerability from cvelistv5
Published
2020-03-13 18:47
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-13T18:47:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14309", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh-usa.com/en/support-and-download", "refsource": "MISC", "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "name": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/", "refsource": "MISC", "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14309", "datePublished": "2020-03-13T18:47:15", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14304 (GCVE-0-2019-14304)
Vulnerability from cvelistv5
Published
2020-01-10 17:58
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Ricoh SP C250DN 1.06 devices allow CSRF.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.06 devices allow CSRF." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-25T04:06:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14304", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ricoh SP C250DN 1.06 devices allow CSRF." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "CONFIRM", "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14304", "datePublished": "2020-01-10T17:58:30", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14302 (GCVE-0-2019-14302)
Vulnerability from cvelistv5
Published
2020-01-10 17:59
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
On Ricoh SP C250DN 1.06 devices, a debug port can be used.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "On Ricoh SP C250DN 1.06 devices, a debug port can be used." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-25T04:06:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14302", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On Ricoh SP C250DN 1.06 devices, a debug port can be used." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "CONFIRM", "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14302", "datePublished": "2020-01-10T17:59:46", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-01-10 18:15
Modified
2024-11-21 04:26
Severity ?
Summary
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A6CB78-5698-4977-A222-09E0BC68C4BC", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54202E48-BBEC-4137-BFC3-8EDBDD7D48D0", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F949759F-F079-45B3-8953-AD09C94928D5", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EA46496-7692-4D16-A510-1CDF66E0E159", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_c250fw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C084AAA8-A995-4BB4-8401-E69B5D2D6E47", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2295D3DC-AF14-49C4-851C-11BF07FCB29D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_c250fwb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C009535C-0CAB-4170-BF77-D80F7E7FC2D2", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C99DFFE-3061-49B6-87FE-A9BFD85F50C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:p_c300w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E46DF1A5-0CD8-4E74-8DA2-829E2F0F0885", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C9905DD-A2CD-41BA-92D9-AD68E891DFA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:p_c301w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D59F15CA-17E2-4984-BE84-9EC002FD2961", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F9EADB-0852-447A-BB18-18AA37E1CEBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8899479F-4D08-4C7A-AF08-D18B33754A6D", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DD2FAEA-A30A-4F52-8C1D-25657F691C05", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BE3ACF6-4691-4486-B6FD-B64886F8BBC5", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BC14860-7610-48E1-9C81-C6F273B95D30", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEF6BE33-59B0-4D61-9F4D-EC97071EFEAA", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61872571-F633-43AA-BEA5-9171B81C6147", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B83B250D-7FA6-4BD8-9F78-4EDCB5000F1A", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89A3FEA6-5EE6-4848-82A6-BD491E8BB9F6", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD9A37D2-F0EE-4ACF-9E60-B7717EC7EAD6", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CAFF590-A772-42DE-8800-0081EB60CE4C", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9EF1CA-E1F3-40AD-9FDB-64AB24C61F71", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "664A7AFD-16E2-4AB4-A409-40596522C638", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*", "matchCriteriaId": "280ED6CC-B977-4C9B-8EC4-FAB605C39BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24BBEED4-7C10-4A46-9523-865348B5A40C", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*", "matchCriteriaId": "92C14354-14B2-4202-A9B8-BB65B0A3BFF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76B05D10-5E4D-4239-B7A7-59540EA8130D", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C5B0A32-50BD-4A9C-B7DA-E6E1D20750F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54D92CC2-0EFC-43E2-B0A3-A332F85E5147", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5FDEBF-EB68-417E-AF0D-1E9D786E019B", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6283DF5E-A2AC-46AA-9DEB-B76DEB52C977", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2135C13B-5395-4FAC-979C-6CAD20EE221F", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96DAE05B-374A-4149-A2FC-0F9246299AAC", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B16367-B607-4348-9A1B-3D9D7BE6E3C3", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B403690-F713-4253-AAFF-A29FBED8AA71", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2A3DA7-BEAE-4C71-A0DD-D5D65273CB31", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F7D26BE-4814-4814-AB29-45170C6236CD", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF64BC9-4F3A-4E18-AE32-04E6C6627D91", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2746858-D63D-4AFF-8DED-BF7C8F2BDC93", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D13A2A-0870-4E48-8309-8A73B9DA9788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BD6DBA-8298-4CBD-AB0A-86CF9543EB51", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49641455-13A9-4067-94BC-BAD0DF948E2D", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FDB22E5-02F5-4CF5-A486-2D85FCFA0855", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9143906C-717E-4B13-B18F-5345ECCC5813", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A049DB-EABF-47CE-871E-E2953B0B0336", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BB4C236-437E-40BE-99E1-5B87A5EDF43D", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B3DD8B9-B020-4A9C-9483-59608AF34836", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D6CAA8A-9249-4A83-8303-DCD497A3D403", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "17D78F4E-3E5F-4429-91D0-00CDB654BE70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CC6479E-7D1E-4E75-9655-CC5078EEC971", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0D61DE5-4A98-4C38-BE1C-0A201E3DE798", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4F82C96-8A84-4758-B751-2E4EB402D2FF", "versionEndExcluding": "1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC2924A-4E60-4CD4-9E54-411BE8E100C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75F79B35-46E0-4690-8C27-CA4566F33EAF", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D860DCF2-327E-4C44-A37D-7DBC73D2CAC4", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16A3335E-8963-4134-AAD4-E94DC644BA79", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "590D1992-6123-47C9-A546-BB758754B5D7", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "FFD58F60-2EA2-4833-9D8B-F85AF0B81719", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E05CF252-3A6C-4C51-B3DF-2BBD20BD8AC2", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D16EF7B-4C5C-4BB5-AAE3-8891748F6206", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "065D4968-67D4-4F7D-B359-9A792458AE32", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "DD02F8F2-E629-4FDA-BCFA-71BA3A64E8D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D70DEF67-E3FA-4725-A5CB-4DCCF4B93809", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA066087-C58B-41D8-ABAC-FC35EB208DEE", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*", "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2)." }, { "lang": "es", "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.06, tienen un Control de Acceso Incorrecto (problema 1 de 2)." } ], "id": "CVE-2019-14301", "lastModified": "2024-11-21T04:26:26.527", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-10T18:15:11.333", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-13 19:15
Modified
2024-11-21 04:26
Severity ?
Summary
Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ricoh | sp_c250sf_firmware | * | |
ricoh | sp_c250sf | - | |
ricoh | sp_c252sf_firmware | * | |
ricoh | sp_c252sf | - | |
ricoh | sp_c250dn_firmware | 1.05 | |
ricoh | sp_c250dn | - | |
ricoh | sp_c252dn_firmware | * | |
ricoh | sp_c252dn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D5B3F9E-EFE6-4B4D-A77D-857543C5FD7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12DDFC54-73AD-474E-9150-ED2FBB418ECE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:1.05:*:*:*:*:*:*:*", "matchCriteriaId": "9BA52538-4A4E-4927-A7EB-38D14B384FA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA1CCD6-3773-45A1-9A3D-31235783B2C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders." }, { "lang": "es", "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.05, presenta una contrase\u00f1a fija. Se detect\u00f3 que la credencial del servicio FTP estaba embebida dentro del firmware de la impresora. Esto permitir\u00eda a un atacante acceder y leer la informaci\u00f3n almacenada en las carpetas compartidas del FTP." } ], "id": "CVE-2019-14309", "lastModified": "2024-11-21T04:26:28.030", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-13T19:15:16.837", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh-usa.com/en/support-and-download" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-26 15:15
Modified
2024-11-21 04:26
Severity ?
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ricoh | sp_c250sf_firmware | * | |
ricoh | sp_c250sf | - | |
ricoh | sp_c252sf_firmware | * | |
ricoh | sp_c252sf | - | |
ricoh | sp_c250dn_firmware | * | |
ricoh | sp_c250dn | - | |
ricoh | sp_c252dn_firmware | * | |
ricoh | sp_c252dn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775D91D0-68A3-4FEA-86F0-F4D408477732", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E807AEA0-1B04-4D20-B07A-DCFDF15892C9", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FE51E36-799C-4466-92E5-AB3965E0A562", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F8BC805-7C0F-4C59-8C7F-930899951F27", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." }, { "lang": "es", "value": "Varias impresoras Ricoh presentan m\u00faltiples desbordamientos de b\u00fafer al analizar la configuraci\u00f3n de par\u00e1metros HTTP para Wi-Fi, mDNS, POP3, SMTP y alertas de notificaci\u00f3n, lo que permite a un atacante causar una denegaci\u00f3n de servicio o ejecuci\u00f3n de c\u00f3digo por medio de peticiones dise\u00f1adas hacia el servidor web. Las versiones de firmware afectadas dependen de los modelos de impresora. Una configuraci\u00f3n afectada es cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* hasta versi\u00f3n 1.06 inclusive ejecut\u00e1ndose en cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Otra configuraci\u00f3n afectada es cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* hasta versi\u00f3n 1.12 inclusive ejecut\u00e1ndose en cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ], "id": "CVE-2019-14305", "lastModified": "2024-11-21T04:26:27.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-26T15:15:11.737", "references": [ { "source": "cve@mitre.org", "url": "http://jvn.jp/en/jp/JVN11708203/index.html" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN11708203/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-26 14:15
Modified
2024-11-21 04:26
Severity ?
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the LPD service. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ricoh | sp_c250sf_firmware | * | |
ricoh | sp_c250sf | - | |
ricoh | sp_c252sf_firmware | * | |
ricoh | sp_c252sf | - | |
ricoh | sp_c250dn_firmware | * | |
ricoh | sp_c250dn | - | |
ricoh | sp_c252dn_firmware | * | |
ricoh | sp_c252dn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775D91D0-68A3-4FEA-86F0-F4D408477732", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E807AEA0-1B04-4D20-B07A-DCFDF15892C9", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FE51E36-799C-4466-92E5-AB3965E0A562", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F8BC805-7C0F-4C59-8C7F-930899951F27", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the LPD service. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." }, { "lang": "es", "value": "Varias impresoras Ricoh tienen m\u00faltiples desbordamientos de b\u00fafer que analizan paquetes LPD, lo que permite que un atacante provoque una denegaci\u00f3n de servicio o ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de solicitudes dise\u00f1adas para el servicio LPD. Las versiones de firmware afectadas dependen de los modelos de impresora. Una configuraci\u00f3n afectada es cpe: 2.3: o: ricoh: sp_c250dn_firmware: -: *: *: *: *: *: *: * hasta (incluido) 1.06 ejecut\u00e1ndose en cpe: 2.3: o: ricoh: sp_c250dn: -: * : *: *: *: *: *: *, cpe: 2.3: o: ricoh: sp_c252dn: -: *: *: *: *: *: *: *. Otra configuraci\u00f3n afectada es cpe: 2.3: o: ricoh: sp_c250sf_firmware: -: *: *: *: *: *: *: * hasta 1.12 inclusive ejecut\u00e1ndose en cpe: 2.3: o: ricoh: sp_c250sf: -: * : *: *: *: *: *: *, cpe: 2.3: o: ricoh: sp_c252sf: -: *: *: *: *: *: *: *." } ], "id": "CVE-2019-14308", "lastModified": "2024-11-21T04:26:27.880", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-26T14:15:10.797", "references": [ { "source": "cve@mitre.org", "url": "http://jvn.jp/en/jp/JVN11708203/index.html" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN11708203/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-26 15:15
Modified
2024-11-21 04:26
Severity ?
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ricoh | sp_c250sf_firmware | * | |
ricoh | sp_c250sf | - | |
ricoh | sp_c252sf_firmware | * | |
ricoh | sp_c252sf | - | |
ricoh | sp_c250dn_firmware | * | |
ricoh | sp_c250dn | - | |
ricoh | sp_c252dn_firmware | * | |
ricoh | sp_c252dn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775D91D0-68A3-4FEA-86F0-F4D408477732", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E807AEA0-1B04-4D20-B07A-DCFDF15892C9", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FE51E36-799C-4466-92E5-AB3965E0A562", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F8BC805-7C0F-4C59-8C7F-930899951F27", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." }, { "lang": "es", "value": "Varias impresoras Ricoh presentan m\u00faltiples desbordamientos de b\u00fafer al analizar las cabeceras HTTP cookie, lo que permite a un atacante causar una denegaci\u00f3n de servicio o ejecuci\u00f3n de c\u00f3digo por medio de peticiones dise\u00f1adas hacia el servidor web. Las versiones de firmware afectadas dependen de los modelos de impresora. Una configuraci\u00f3n afectada es cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* hasta la versi\u00f3n 1.06 inclusive ejecut\u00e1ndose en cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Otra configuraci\u00f3n afectada es cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:*hasta la versi\u00f3n 1.12 inclusive ejecut\u00e1ndose en cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ], "id": "CVE-2019-14300", "lastModified": "2024-11-21T04:26:24.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-26T15:15:11.687", "references": [ { "source": "cve@mitre.org", "url": "http://jvn.jp/en/jp/JVN11708203/index.html" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN11708203/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-13 19:15
Modified
2024-11-21 04:26
Severity ?
Summary
Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ricoh | sp_c250sf_firmware | * | |
ricoh | sp_c250sf | - | |
ricoh | sp_c252sf_firmware | * | |
ricoh | sp_c252sf | - | |
ricoh | sp_c250dn_firmware | 1.05 | |
ricoh | sp_c250dn | - | |
ricoh | sp_c252dn_firmware | * | |
ricoh | sp_c252dn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D5B3F9E-EFE6-4B4D-A77D-857543C5FD7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12DDFC54-73AD-474E-9150-ED2FBB418ECE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:1.05:*:*:*:*:*:*:*", "matchCriteriaId": "9BA52538-4A4E-4927-A7EB-38D14B384FA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA1CCD6-3773-45A1-9A3D-31235783B2C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets" }, { "lang": "es", "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.05, permiten una denegaci\u00f3n de servicio (problema 2 de 3). Los paquetes dise\u00f1ados no autenticados en el servicio IPP causar\u00e1n que un dispositivo vulnerable se bloquee. Se ha identificado una corrupci\u00f3n de la memoria en la manera en como el dispositivo incorporado analiz\u00f3 los paquetes IPP" } ], "id": "CVE-2019-14310", "lastModified": "2024-11-21T04:26:28.177", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-13T19:15:16.917", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh-usa.com/en/support-and-download" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-10 18:15
Modified
2024-11-21 04:26
Severity ?
Summary
Ricoh SP C250DN 1.06 devices allow CSRF.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A6CB78-5698-4977-A222-09E0BC68C4BC", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54202E48-BBEC-4137-BFC3-8EDBDD7D48D0", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F949759F-F079-45B3-8953-AD09C94928D5", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EA46496-7692-4D16-A510-1CDF66E0E159", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_c250fw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C084AAA8-A995-4BB4-8401-E69B5D2D6E47", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2295D3DC-AF14-49C4-851C-11BF07FCB29D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_c250fwb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C009535C-0CAB-4170-BF77-D80F7E7FC2D2", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C99DFFE-3061-49B6-87FE-A9BFD85F50C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:p_c300w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E46DF1A5-0CD8-4E74-8DA2-829E2F0F0885", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C9905DD-A2CD-41BA-92D9-AD68E891DFA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:p_c301w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D59F15CA-17E2-4984-BE84-9EC002FD2961", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F9EADB-0852-447A-BB18-18AA37E1CEBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8899479F-4D08-4C7A-AF08-D18B33754A6D", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DD2FAEA-A30A-4F52-8C1D-25657F691C05", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BE3ACF6-4691-4486-B6FD-B64886F8BBC5", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BC14860-7610-48E1-9C81-C6F273B95D30", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEF6BE33-59B0-4D61-9F4D-EC97071EFEAA", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61872571-F633-43AA-BEA5-9171B81C6147", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B83B250D-7FA6-4BD8-9F78-4EDCB5000F1A", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89A3FEA6-5EE6-4848-82A6-BD491E8BB9F6", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD9A37D2-F0EE-4ACF-9E60-B7717EC7EAD6", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CAFF590-A772-42DE-8800-0081EB60CE4C", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9EF1CA-E1F3-40AD-9FDB-64AB24C61F71", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "664A7AFD-16E2-4AB4-A409-40596522C638", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*", "matchCriteriaId": "280ED6CC-B977-4C9B-8EC4-FAB605C39BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24BBEED4-7C10-4A46-9523-865348B5A40C", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*", "matchCriteriaId": "92C14354-14B2-4202-A9B8-BB65B0A3BFF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76B05D10-5E4D-4239-B7A7-59540EA8130D", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C5B0A32-50BD-4A9C-B7DA-E6E1D20750F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54D92CC2-0EFC-43E2-B0A3-A332F85E5147", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5FDEBF-EB68-417E-AF0D-1E9D786E019B", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6283DF5E-A2AC-46AA-9DEB-B76DEB52C977", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2135C13B-5395-4FAC-979C-6CAD20EE221F", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96DAE05B-374A-4149-A2FC-0F9246299AAC", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B16367-B607-4348-9A1B-3D9D7BE6E3C3", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B403690-F713-4253-AAFF-A29FBED8AA71", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2A3DA7-BEAE-4C71-A0DD-D5D65273CB31", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F7D26BE-4814-4814-AB29-45170C6236CD", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF64BC9-4F3A-4E18-AE32-04E6C6627D91", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2746858-D63D-4AFF-8DED-BF7C8F2BDC93", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D13A2A-0870-4E48-8309-8A73B9DA9788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BD6DBA-8298-4CBD-AB0A-86CF9543EB51", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49641455-13A9-4067-94BC-BAD0DF948E2D", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FDB22E5-02F5-4CF5-A486-2D85FCFA0855", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9143906C-717E-4B13-B18F-5345ECCC5813", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A049DB-EABF-47CE-871E-E2953B0B0336", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BB4C236-437E-40BE-99E1-5B87A5EDF43D", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B3DD8B9-B020-4A9C-9483-59608AF34836", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D6CAA8A-9249-4A83-8303-DCD497A3D403", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "17D78F4E-3E5F-4429-91D0-00CDB654BE70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CC6479E-7D1E-4E75-9655-CC5078EEC971", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0D61DE5-4A98-4C38-BE1C-0A201E3DE798", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4F82C96-8A84-4758-B751-2E4EB402D2FF", "versionEndExcluding": "1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC2924A-4E60-4CD4-9E54-411BE8E100C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75F79B35-46E0-4690-8C27-CA4566F33EAF", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D860DCF2-327E-4C44-A37D-7DBC73D2CAC4", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16A3335E-8963-4134-AAD4-E94DC644BA79", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "590D1992-6123-47C9-A546-BB758754B5D7", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "FFD58F60-2EA2-4833-9D8B-F85AF0B81719", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E05CF252-3A6C-4C51-B3DF-2BBD20BD8AC2", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D16EF7B-4C5C-4BB5-AAE3-8891748F6206", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "065D4968-67D4-4F7D-B359-9A792458AE32", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "DD02F8F2-E629-4FDA-BCFA-71BA3A64E8D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D70DEF67-E3FA-4725-A5CB-4DCCF4B93809", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA066087-C58B-41D8-ABAC-FC35EB208DEE", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*", "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.06 devices allow CSRF." }, { "lang": "es", "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.06, permite un ataque de tipo CSRF." } ], "id": "CVE-2019-14304", "lastModified": "2024-11-21T04:26:27.137", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-10T18:15:11.507", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-26 15:15
Modified
2024-11-21 04:26
Severity ?
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ricoh | sp_c250sf_firmware | * | |
ricoh | sp_c250sf | - | |
ricoh | sp_c252sf_firmware | * | |
ricoh | sp_c252sf | - | |
ricoh | sp_c250dn_firmware | * | |
ricoh | sp_c250dn | - | |
ricoh | sp_c252dn_firmware | * | |
ricoh | sp_c252dn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775D91D0-68A3-4FEA-86F0-F4D408477732", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E807AEA0-1B04-4D20-B07A-DCFDF15892C9", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FE51E36-799C-4466-92E5-AB3965E0A562", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F8BC805-7C0F-4C59-8C7F-930899951F27", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." }, { "lang": "es", "value": "Varias impresoras Ricoh presentan m\u00faltiples desbordamientos de b\u00fafer al analizar la configuraci\u00f3n de par\u00e1metros HTTP para SNMP, lo que permite a un atacante causar una denegaci\u00f3n de servicio o ejecuci\u00f3n de c\u00f3digo por medio de peticiones dise\u00f1adas hacia el servidor web. Las versiones de firmware afectadas dependen de los modelos de impresora. Una configuraci\u00f3n afectada es cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* hasta la versi\u00f3n 1.06 inclusive ejecut\u00e1ndose en cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Otra configuraci\u00f3n afectada es cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:*hasta la versi\u00f3n 1.12 inclusive ejecut\u00e1ndose en cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ], "id": "CVE-2019-14307", "lastModified": "2024-11-21T04:26:27.720", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-26T15:15:11.797", "references": [ { "source": "cve@mitre.org", "url": "http://jvn.jp/en/jp/JVN11708203/index.html" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN11708203/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-10 18:15
Modified
2024-11-21 04:26
Severity ?
Summary
On Ricoh SP C250DN 1.06 devices, a debug port can be used.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A6CB78-5698-4977-A222-09E0BC68C4BC", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54202E48-BBEC-4137-BFC3-8EDBDD7D48D0", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F949759F-F079-45B3-8953-AD09C94928D5", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EA46496-7692-4D16-A510-1CDF66E0E159", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8899479F-4D08-4C7A-AF08-D18B33754A6D", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DD2FAEA-A30A-4F52-8C1D-25657F691C05", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BE3ACF6-4691-4486-B6FD-B64886F8BBC5", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BC14860-7610-48E1-9C81-C6F273B95D30", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEF6BE33-59B0-4D61-9F4D-EC97071EFEAA", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61872571-F633-43AA-BEA5-9171B81C6147", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B83B250D-7FA6-4BD8-9F78-4EDCB5000F1A", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89A3FEA6-5EE6-4848-82A6-BD491E8BB9F6", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD9A37D2-F0EE-4ACF-9E60-B7717EC7EAD6", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CAFF590-A772-42DE-8800-0081EB60CE4C", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9EF1CA-E1F3-40AD-9FDB-64AB24C61F71", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "664A7AFD-16E2-4AB4-A409-40596522C638", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*", "matchCriteriaId": "280ED6CC-B977-4C9B-8EC4-FAB605C39BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24BBEED4-7C10-4A46-9523-865348B5A40C", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*", "matchCriteriaId": "92C14354-14B2-4202-A9B8-BB65B0A3BFF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76B05D10-5E4D-4239-B7A7-59540EA8130D", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C5B0A32-50BD-4A9C-B7DA-E6E1D20750F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54D92CC2-0EFC-43E2-B0A3-A332F85E5147", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5FDEBF-EB68-417E-AF0D-1E9D786E019B", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6283DF5E-A2AC-46AA-9DEB-B76DEB52C977", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2135C13B-5395-4FAC-979C-6CAD20EE221F", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96DAE05B-374A-4149-A2FC-0F9246299AAC", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B16367-B607-4348-9A1B-3D9D7BE6E3C3", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B403690-F713-4253-AAFF-A29FBED8AA71", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2A3DA7-BEAE-4C71-A0DD-D5D65273CB31", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F7D26BE-4814-4814-AB29-45170C6236CD", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF64BC9-4F3A-4E18-AE32-04E6C6627D91", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2746858-D63D-4AFF-8DED-BF7C8F2BDC93", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D13A2A-0870-4E48-8309-8A73B9DA9788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BD6DBA-8298-4CBD-AB0A-86CF9543EB51", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49641455-13A9-4067-94BC-BAD0DF948E2D", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FDB22E5-02F5-4CF5-A486-2D85FCFA0855", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9143906C-717E-4B13-B18F-5345ECCC5813", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A049DB-EABF-47CE-871E-E2953B0B0336", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BB4C236-437E-40BE-99E1-5B87A5EDF43D", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B3DD8B9-B020-4A9C-9483-59608AF34836", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D6CAA8A-9249-4A83-8303-DCD497A3D403", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "17D78F4E-3E5F-4429-91D0-00CDB654BE70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CC6479E-7D1E-4E75-9655-CC5078EEC971", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0D61DE5-4A98-4C38-BE1C-0A201E3DE798", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4F82C96-8A84-4758-B751-2E4EB402D2FF", "versionEndExcluding": "1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC2924A-4E60-4CD4-9E54-411BE8E100C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75F79B35-46E0-4690-8C27-CA4566F33EAF", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D860DCF2-327E-4C44-A37D-7DBC73D2CAC4", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16A3335E-8963-4134-AAD4-E94DC644BA79", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "590D1992-6123-47C9-A546-BB758754B5D7", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "FFD58F60-2EA2-4833-9D8B-F85AF0B81719", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E05CF252-3A6C-4C51-B3DF-2BBD20BD8AC2", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D16EF7B-4C5C-4BB5-AAE3-8891748F6206", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "065D4968-67D4-4F7D-B359-9A792458AE32", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "DD02F8F2-E629-4FDA-BCFA-71BA3A64E8D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D70DEF67-E3FA-4725-A5CB-4DCCF4B93809", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA066087-C58B-41D8-ABAC-FC35EB208DEE", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*", "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210su_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7A302D2-8EA9-4770-B797-54B4A68268E9", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210su:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D3B1B91-C752-4177-9098-76F96A910509", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210su_q_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "949F5C47-DEE4-4F01-90E4-E9A577A4DE3A", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210su_q_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "16604595-6307-47CB-A453-F6F2AA107C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210su_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E166CCF1-C5FF-4A10-A9D9-43AB71A42B76", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210su:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB3FB195-30AE-4EAE-A290-EED2F9D1E380", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC1EC8A5-E37B-4BC7-851F-B8A349C0C02F", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "5201E788-DFCD-4288-BC3C-1082F2B48241", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210sf_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C55A4856-E7A8-4022-8588-EC65FC6DD985", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210sf_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "B73D8E6B-5870-468B-BFE6-72829AFE0896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210sf_q_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68799164-71D7-48C5-9A26-6907D96F69F6", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210sf_q_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "13D69E95-5F4A-431A-BB52-35778AC12B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_211sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10D03A34-4FAA-4AE5-92D2-22373A184AE4", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_211sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD4B3755-1B04-4C7A-9FFD-ED59CDF49B54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_211su_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75F9C3AB-3D8F-4FAD-8017-127D193A7633", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_211su:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D04427-93BC-4400-B183-1A4550F1E600", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C2EDF78-9E24-4F94-B809-69540E879923", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210:-:*:*:*:*:*:*:*", "matchCriteriaId": "54D81037-C1CE-482C-8585-F11C38A227C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C102DB1-363E-4ACB-8805-D1C2814DF1BD", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "A10D2575-8537-4936-9D19-51C9DB0C4674", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210_q_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E89CF45-58F5-4914-8D07-EA41468C41E2", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210_q_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "034A4759-4B33-4EB2-9959-31C387A27FB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210e_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D854FB4-6B89-4527-854D-DA6EE5F4A34E", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210e_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "136865AF-C26B-41D2-917E-1B5722EF51FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_211_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E581A4F-FA5B-43F7-83CF-4376AE5A760D", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_211:-:*:*:*:*:*:*:*", "matchCriteriaId": "73C578D8-6AB7-4A89-BC26-5A214128D0A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On Ricoh SP C250DN 1.06 devices, a debug port can be used." }, { "lang": "es", "value": "En dispositivos Ricoh SP C250DN versi\u00f3n 1.06, un puerto de depuraci\u00f3n puede ser usado." } ], "id": "CVE-2019-14302", "lastModified": "2024-11-21T04:26:26.787", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-10T18:15:11.413", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-10 18:15
Modified
2024-11-21 04:26
Severity ?
Summary
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A6CB78-5698-4977-A222-09E0BC68C4BC", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54202E48-BBEC-4137-BFC3-8EDBDD7D48D0", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F949759F-F079-45B3-8953-AD09C94928D5", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EA46496-7692-4D16-A510-1CDF66E0E159", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8899479F-4D08-4C7A-AF08-D18B33754A6D", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DD2FAEA-A30A-4F52-8C1D-25657F691C05", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BE3ACF6-4691-4486-B6FD-B64886F8BBC5", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BC14860-7610-48E1-9C81-C6F273B95D30", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEF6BE33-59B0-4D61-9F4D-EC97071EFEAA", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61872571-F633-43AA-BEA5-9171B81C6147", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B83B250D-7FA6-4BD8-9F78-4EDCB5000F1A", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89A3FEA6-5EE6-4848-82A6-BD491E8BB9F6", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD9A37D2-F0EE-4ACF-9E60-B7717EC7EAD6", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CAFF590-A772-42DE-8800-0081EB60CE4C", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9EF1CA-E1F3-40AD-9FDB-64AB24C61F71", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "664A7AFD-16E2-4AB4-A409-40596522C638", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*", "matchCriteriaId": "280ED6CC-B977-4C9B-8EC4-FAB605C39BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24BBEED4-7C10-4A46-9523-865348B5A40C", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*", "matchCriteriaId": "92C14354-14B2-4202-A9B8-BB65B0A3BFF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76B05D10-5E4D-4239-B7A7-59540EA8130D", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C5B0A32-50BD-4A9C-B7DA-E6E1D20750F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54D92CC2-0EFC-43E2-B0A3-A332F85E5147", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5FDEBF-EB68-417E-AF0D-1E9D786E019B", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6283DF5E-A2AC-46AA-9DEB-B76DEB52C977", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2135C13B-5395-4FAC-979C-6CAD20EE221F", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96DAE05B-374A-4149-A2FC-0F9246299AAC", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B16367-B607-4348-9A1B-3D9D7BE6E3C3", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B403690-F713-4253-AAFF-A29FBED8AA71", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2A3DA7-BEAE-4C71-A0DD-D5D65273CB31", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F7D26BE-4814-4814-AB29-45170C6236CD", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF64BC9-4F3A-4E18-AE32-04E6C6627D91", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2746858-D63D-4AFF-8DED-BF7C8F2BDC93", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D13A2A-0870-4E48-8309-8A73B9DA9788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BD6DBA-8298-4CBD-AB0A-86CF9543EB51", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49641455-13A9-4067-94BC-BAD0DF948E2D", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FDB22E5-02F5-4CF5-A486-2D85FCFA0855", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9143906C-717E-4B13-B18F-5345ECCC5813", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A049DB-EABF-47CE-871E-E2953B0B0336", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BB4C236-437E-40BE-99E1-5B87A5EDF43D", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B3DD8B9-B020-4A9C-9483-59608AF34836", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D6CAA8A-9249-4A83-8303-DCD497A3D403", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "17D78F4E-3E5F-4429-91D0-00CDB654BE70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CC6479E-7D1E-4E75-9655-CC5078EEC971", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0D61DE5-4A98-4C38-BE1C-0A201E3DE798", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4F82C96-8A84-4758-B751-2E4EB402D2FF", "versionEndExcluding": "1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC2924A-4E60-4CD4-9E54-411BE8E100C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75F79B35-46E0-4690-8C27-CA4566F33EAF", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D860DCF2-327E-4C44-A37D-7DBC73D2CAC4", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16A3335E-8963-4134-AAD4-E94DC644BA79", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "590D1992-6123-47C9-A546-BB758754B5D7", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "FFD58F60-2EA2-4833-9D8B-F85AF0B81719", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E05CF252-3A6C-4C51-B3DF-2BBD20BD8AC2", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D16EF7B-4C5C-4BB5-AAE3-8891748F6206", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "065D4968-67D4-4F7D-B359-9A792458AE32", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "DD02F8F2-E629-4FDA-BCFA-71BA3A64E8D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D70DEF67-E3FA-4725-A5CB-4DCCF4B93809", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA066087-C58B-41D8-ABAC-FC35EB208DEE", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*", "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2)." }, { "lang": "es", "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.06 tienen un control de acceso incorrecto (problema 2 de 2)." } ], "id": "CVE-2019-14306", "lastModified": "2024-11-21T04:26:27.530", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-10T18:15:11.583", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-13 19:15
Modified
2024-11-21 04:26
Severity ?
Summary
Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ricoh | sp_c250sf_firmware | * | |
ricoh | sp_c250sf | - | |
ricoh | sp_c252sf_firmware | * | |
ricoh | sp_c252sf | - | |
ricoh | sp_c250dn_firmware | 1.05 | |
ricoh | sp_c250dn | - | |
ricoh | sp_c252dn_firmware | * | |
ricoh | sp_c252dn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D5B3F9E-EFE6-4B4D-A77D-857543C5FD7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12DDFC54-73AD-474E-9150-ED2FBB418ECE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:1.05:*:*:*:*:*:*:*", "matchCriteriaId": "9BA52538-4A4E-4927-A7EB-38D14B384FA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA1CCD6-3773-45A1-9A3D-31235783B2C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force." }, { "lang": "es", "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.05, presentan un M\u00e9todo de Autenticaci\u00f3n Vulnerable a los Ataques de Fuerza Bruta. Algunas impresoras Ricoh no implementaron el bloqueo de cuentas. Por lo tanto, fue posible obtener las credenciales de la cuenta local mediante fuerza bruta." } ], "id": "CVE-2019-14299", "lastModified": "2024-11-21T04:26:24.413", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-13T19:15:16.697", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh-usa.com/en/support-and-download" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-307" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-15 20:15
Modified
2024-11-21 06:09
Severity ?
Summary
RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1 | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.ricoh.com/info/2022/0228_1/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ricoh.com/info/2022/0228_1/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_320dn_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "2AFFCBAA-BE50-4805-9291-5467A9631403", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_320dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "C95D9780-65C6-4B81-8F35-2813A848A173", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_325dnw_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "962F3947-4221-4635-B1EE-A56241EB6707", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_325dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "573EF7D3-9176-4C34-AA74-3D24B73DFA5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_320sn_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "3A71F3CD-560D-477F-9DDD-A287219F0110", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_320sn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ED832B5-D02F-481C-B37F-C22E4DB0A61E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_320sfn_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "B89AAB7A-9585-4F69-BD14-4F5551F095CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_320sfn:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD3EAAEB-4C06-431B-9AFC-F239887D2BB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_325snw_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "13DBA1D9-1213-4369-85F6-1B63637882D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_325snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A09F53C4-8812-4443-BD4B-AF324181C18E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_325sfnw_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "0B4B586E-1563-4384-9757-312CC88F135B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_325sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D22E053-B67E-4E44-9D57-2435072443D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "7ECE3F8A-6752-402C-A4FD-8ED32F5E95EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:aficio_sp_3500sf_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "70BA0414-4E04-4CD0-BA68-87B930387C98", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:aficio_sp_3500sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD5F3DA9-0CAF-4406-908E-1EF2BC4D76AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "A05AA95F-1BF7-4745-86B4-67652A75F3B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "A3F8A2E1-3D08-43F4-AB12-307D6A570550", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "9EA530E6-22C6-421C-89E0-6A44A0348FF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "38AAF87C-F3B5-423B-B4CA-3D52231E27AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "5393654C-8BB3-4D3C-8680-F70C6AE75EAA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "630C8611-B9E2-4F76-82E0-B6304CC369EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_c2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45BA4A60-4461-49F4-B17B-9A10EC475745", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_c2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DFF8AC-6A24-458B-A889-7B329C308F12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_c250fwb_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "755683E0-250E-4E6F-B183-B108B5C04741", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C99DFFE-3061-49B6-87FE-A9BFD85F50C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_c250fw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "912DC9F9-1E39-48D2-8AA4-55EF65432A04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2295D3DC-AF14-49C4-851C-11BF07FCB29D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F4C4953-C969-4004-882D-6C058563210A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E47AC0F9-6B1E-4A20-87FB-28576209F330", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "846985A5-B69E-4795-B0E2-2D3FC6A85B6B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B991D914-E315-4496-A53C-6A261BDEF441", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A497D5E3-18F7-42E0-82D2-17DEAEFB46C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:p_c300w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3D53358-B3F2-404A-BCDE-32A846476B7E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C9905DD-A2CD-41BA-92D9-AD68E891DFA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:p_c301w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A320FC9-9693-4216-B692-561B0650EFFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F9EADB-0852-447A-BB18-18AA37E1CEBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED3F89E-5CC3-481B-83A9-9440069D0AD2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D6ED462-2E40-44A9-AF8B-27985FA087B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "083EBD7C-D6A8-45E6-B148-A9D106E1CA81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21810652-156E-420B-8F3D-EC90B8D37FA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFFBB4FB-B563-44C3-9717-71D37CC84E71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE134F15-47ED-44B9-890D-90C599A20EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_320:-:*:*:*:*:*:*:*", "matchCriteriaId": "622DB5B8-A941-4D27-85D2-D773DE8C8AE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_320fb_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "015DBADB-A471-4D0A-AC2B-A18C3D800CB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_320fb:-:*:*:*:*:*:*:*", "matchCriteriaId": "08069959-1CE6-4984-AF39-730C47995167", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_320f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "601973FF-2702-4CBB-84C0-2A3C8B808649", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_320f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AA005BA-F4B3-421F-A326-826570E186CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8471CE9D-F89D-4CDF-B221-89C5E383E0E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "624D23F4-CE3B-4AE5-A725-CF011350042F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F9102FE-530E-410E-9635-25F0010B4520", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F6218A-9C8F-4A6D-90D7-87615F45651F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70370362-B452-44AC-897A-AD960E31761C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B3BCF5-B904-4715-BC08-675BFD4917EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E7A86B7-843F-41B2-AC5A-02528255AAA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4241366A-2231-4785-8C13-9FACBB66AB5A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "567E74DA-1E56-4262-B8CC-C1E94BAFDA45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0734544-6992-427C-BDC2-233261BABB70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FD5B349-DA0D-4295-9B8A-E45BC2E2279C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_325snw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61E0AEBA-F106-4E2D-948F-704D4A101412", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_325snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A09F53C4-8812-4443-BD4B-AF324181C18E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_325sfnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8387E54-CBA8-4D05-A51D-248B8A385C8F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_325sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D22E053-B67E-4E44-9D57-2435072443D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_377snwx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "839D1AD0-614F-4FB6-A1AC-5BA456D33482", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_377snwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1CE7C5-928A-4F5B-9639-C588D2F53052", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_377sfnwx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE400B01-6328-4E05-9C7F-B03F6F5EA5D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_377sfnwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F832C4D-0801-47AC-9356-51CC31AA18F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70368414-B134-46C2-B0CD-6912AC94D055", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D89773C-E6D4-40B0-84DA-CC48B5DB2CEB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81650D86-B533-41E1-B7EE-63974AF4D642", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D638CE-DC22-403C-B7D9-BBF6907DB5A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "09A39236-1C30-47AE-B33E-365E33369F06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2F5261-CB06-4665-8D45-284407D26CBB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34A4A92B-CA2A-4342-9D76-59044C836E1F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A22556D8-59FC-41E7-91F9-16EE5435FF80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_311sfnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A560C602-8B18-4BDF-9841-504E9EF93E4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_311sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "542F28B3-6D96-4D0F-81C4-3E511B58D960", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_310sfnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F71E8F03-9DF7-4A48-BCF4-6E2842BC0DBD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_310sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF4C4841-E950-4F22-A578-FBEB6EF7DD71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_312sfnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0C35518-7548-412D-9982-CB190C175AB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_312sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A06663D7-BCED-465C-82E9-E96EF0115481", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:p_310_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F9401F0-0216-4A4A-B0C1-3EA18A61BA25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:p_310:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EC50CE5-F7D0-4D1F-882B-BB2FFEC0866C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:p_311_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7802EE19-0D37-4A36-93AB-3FA87B888145", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:p_311:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DF94B2-D54C-4BD2-A32C-1F97EA1C58BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7A60FDF-F13B-48F1-AFD5-F081D9484AED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A4A020F-7958-41C3-87FD-CF786D5BA3F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5EB2233-6C50-4536-911E-F5FAB3129A76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58A07E5-5733-4EBB-B5E3-BA5D762BA81F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277nwx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E6C927-5BDB-4711-BD30-482F74763AE7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277nwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "95735C72-4F4A-41D2-8116-9086B8E9687E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_325dnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B904062D-A2EE-4B8E-A346-DA9133E2FC27", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_325dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "573EF7D3-9176-4C34-AA74-3D24B73DFA5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_377dnwx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19C80677-D05C-48F2-8769-77740060C32C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_377dnwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "40BB8F8F-3D4E-4CC5-8F80-318AAE09B349", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2B0590-A7CF-478F-B354-8D482D968472", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB556FD4-9796-4F06-8867-74692C4F5FDC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A173A3A0-76E3-418D-B102-435EA9B7ECD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A485D93C-F576-4F19-96EA-A27734B42BFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*", "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_311dnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A886A522-58F7-4CED-B493-35BB67E50FFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_311dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9911B154-8E41-47F7-9EF8-FDE3AAF3FB64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_310dnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DC9091-FD39-4445-827F-4E6E875726F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_310dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "42508ED0-CFA7-4C99-A463-945C2D5D3273", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_312dnw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CBA1330-66EF-4781-A0FA-C42CA059F94D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_312dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "861D1A70-D4B0-48B5-B9F3-81689A1AEF72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data." }, { "lang": "es", "value": "Se ha detectado que los productos de la serie SP de RICOH 320DN, SP 325DNw, SP 320SN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw versi\u00f3n v1.06, contienen un desbordamiento del buffer de pila en el archivo /etc/wpa_supplicant.conf. Esta vulnerabilidad permite a atacantes causar una denegaci\u00f3n de servicio (DoS) por medio de datos desbordados dise\u00f1ados" } ], "id": "CVE-2021-33945", "lastModified": "2024-11-21T06:09:47.557", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-15T20:15:07.407", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2022/0228_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2022/0228_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-13 19:15
Modified
2024-11-21 04:26
Severity ?
Summary
Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ricoh | sp_c250sf_firmware | * | |
ricoh | sp_c250sf | - | |
ricoh | sp_c252sf_firmware | * | |
ricoh | sp_c252sf | - | |
ricoh | sp_c250dn_firmware | 1.05 | |
ricoh | sp_c250dn | - | |
ricoh | sp_c252dn_firmware | * | |
ricoh | sp_c252dn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D5B3F9E-EFE6-4B4D-A77D-857543C5FD7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12DDFC54-73AD-474E-9150-ED2FBB418ECE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:1.05:*:*:*:*:*:*:*", "matchCriteriaId": "9BA52538-4A4E-4927-A7EB-38D14B384FA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA1CCD6-3773-45A1-9A3D-31235783B2C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability." }, { "lang": "es", "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.05, permite una denegaci\u00f3n de servicio (problema 1 de 3). Algunas impresoras Ricoh fueron afectadas por una implementaci\u00f3n err\u00f3nea del servicio LPD que conllev\u00f3 a una vulnerabilidad de denegaci\u00f3n de servicio." } ], "id": "CVE-2019-14303", "lastModified": "2024-11-21T04:26:26.993", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-13T19:15:16.760", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh-usa.com/en/support-and-download" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh-usa.com/en/support-and-download" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }