Vulnerabilites related to ricoh - sp_c252sf
CVE-2021-33945 (GCVE-0-2021-33945)
Vulnerability from cvelistv5
Published
2022-02-15 19:08
Modified
2024-08-04 00:05
Severity ?
CWE
  • n/a
Summary
RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:05:52.451Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh.com/info/2022/0228_1/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-03T01:10:31",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh.com/info/2022/0228_1/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-33945",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1",
              "refsource": "MISC",
              "url": "https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1"
            },
            {
              "name": "https://www.ricoh.com/info/2022/0228_1/",
              "refsource": "MISC",
              "url": "https://www.ricoh.com/info/2022/0228_1/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-33945",
    "datePublished": "2022-02-15T19:08:26",
    "dateReserved": "2021-06-07T00:00:00",
    "dateUpdated": "2024-08-04T00:05:52.451Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14299 (GCVE-0-2019-14299)
Vulnerability from cvelistv5
Published
2020-03-13 18:50
Modified
2024-08-05 00:12
Severity ?
CWE
  • n/a
Summary
Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:12:43.282Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh-usa.com/en/support-and-download"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-13T18:50:21",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh-usa.com/en/support-and-download"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14299",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ricoh-usa.com/en/support-and-download",
              "refsource": "MISC",
              "url": "https://www.ricoh-usa.com/en/support-and-download"
            },
            {
              "name": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/",
              "refsource": "MISC",
              "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14299",
    "datePublished": "2020-03-13T18:50:21",
    "dateReserved": "2019-07-27T00:00:00",
    "dateUpdated": "2024-08-05T00:12:43.282Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14303 (GCVE-0-2019-14303)
Vulnerability from cvelistv5
Published
2020-03-13 18:49
Modified
2024-08-05 00:12
Severity ?
CWE
  • n/a
Summary
Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:12:43.387Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh-usa.com/en/support-and-download"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-13T18:49:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh-usa.com/en/support-and-download"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14303",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ricoh-usa.com/en/support-and-download",
              "refsource": "MISC",
              "url": "https://www.ricoh-usa.com/en/support-and-download"
            },
            {
              "name": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/",
              "refsource": "MISC",
              "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14303",
    "datePublished": "2020-03-13T18:49:00",
    "dateReserved": "2019-07-27T00:00:00",
    "dateUpdated": "2024-08-05T00:12:43.387Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14301 (GCVE-0-2019-14301)
Vulnerability from cvelistv5
Published
2020-01-10 18:00
Modified
2024-08-05 00:12
Severity ?
CWE
  • n/a
Summary
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2).
References
https://www.ricoh.com/info/2019/0823_1/ x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN52962201/index.html third-party-advisory, x_refsource_JVN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:12:43.281Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ricoh.com/info/2019/0823_1/"
          },
          {
            "name": "JVN#52962201",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-25T04:06:03",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ricoh.com/info/2019/0823_1/"
        },
        {
          "name": "JVN#52962201",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14301",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ricoh.com/info/2019/0823_1/",
              "refsource": "CONFIRM",
              "url": "https://www.ricoh.com/info/2019/0823_1/"
            },
            {
              "name": "JVN#52962201",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14301",
    "datePublished": "2020-01-10T18:00:09",
    "dateReserved": "2019-07-27T00:00:00",
    "dateUpdated": "2024-08-05T00:12:43.281Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14305 (GCVE-0-2019-14305)
Vulnerability from cvelistv5
Published
2019-08-26 14:19
Modified
2024-08-05 00:12
CWE
  • n/a
Summary
Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:12:43.376Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh-usa.com/en/support-and-download"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh.com/info/2019/0823_1/"
          },
          {
            "name": "JVN#11708203",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:U/UI:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-13T04:06:08",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh-usa.com/en/support-and-download"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh.com/info/2019/0823_1/"
        },
        {
          "name": "JVN#11708203",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14305",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:U/UI:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ricoh-usa.com/en/support-and-download",
              "refsource": "MISC",
              "url": "https://www.ricoh-usa.com/en/support-and-download"
            },
            {
              "name": "https://www.ricoh.com/info/2019/0823_1/",
              "refsource": "MISC",
              "url": "https://www.ricoh.com/info/2019/0823_1/"
            },
            {
              "name": "JVN#11708203",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14305",
    "datePublished": "2019-08-26T14:19:54",
    "dateReserved": "2019-07-27T00:00:00",
    "dateUpdated": "2024-08-05T00:12:43.376Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14310 (GCVE-0-2019-14310)
Vulnerability from cvelistv5
Published
2020-03-13 18:45
Modified
2024-08-05 00:12
Severity ?
CWE
  • n/a
Summary
Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:12:43.396Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh-usa.com/en/support-and-download"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-13T18:45:22",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh-usa.com/en/support-and-download"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14310",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ricoh-usa.com/en/support-and-download",
              "refsource": "MISC",
              "url": "https://www.ricoh-usa.com/en/support-and-download"
            },
            {
              "name": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/",
              "refsource": "MISC",
              "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14310",
    "datePublished": "2020-03-13T18:45:22",
    "dateReserved": "2019-07-27T00:00:00",
    "dateUpdated": "2024-08-05T00:12:43.396Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14306 (GCVE-0-2019-14306)
Vulnerability from cvelistv5
Published
2020-01-10 17:59
Modified
2024-08-05 00:12
Severity ?
CWE
  • n/a
Summary
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2).
References
https://www.ricoh.com/info/2019/0823_1/ x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN52962201/index.html third-party-advisory, x_refsource_JVN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:12:43.342Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ricoh.com/info/2019/0823_1/"
          },
          {
            "name": "JVN#52962201",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-25T04:06:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ricoh.com/info/2019/0823_1/"
        },
        {
          "name": "JVN#52962201",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14306",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ricoh.com/info/2019/0823_1/",
              "refsource": "CONFIRM",
              "url": "https://www.ricoh.com/info/2019/0823_1/"
            },
            {
              "name": "JVN#52962201",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14306",
    "datePublished": "2020-01-10T17:59:24",
    "dateReserved": "2019-07-27T00:00:00",
    "dateUpdated": "2024-08-05T00:12:43.342Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14300 (GCVE-0-2019-14300)
Vulnerability from cvelistv5
Published
2019-08-26 14:22
Modified
2024-08-05 00:12
Severity ?
CWE
  • n/a
Summary
Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:12:43.251Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh-usa.com/en/support-and-download"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh.com/info/2019/0823_1/"
          },
          {
            "name": "JVN#11708203",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-13T04:06:08",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh-usa.com/en/support-and-download"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh.com/info/2019/0823_1/"
        },
        {
          "name": "JVN#11708203",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14300",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ricoh-usa.com/en/support-and-download",
              "refsource": "MISC",
              "url": "https://www.ricoh-usa.com/en/support-and-download"
            },
            {
              "name": "https://www.ricoh.com/info/2019/0823_1/",
              "refsource": "MISC",
              "url": "https://www.ricoh.com/info/2019/0823_1/"
            },
            {
              "name": "JVN#11708203",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14300",
    "datePublished": "2019-08-26T14:22:06",
    "dateReserved": "2019-07-27T00:00:00",
    "dateUpdated": "2024-08-05T00:12:43.251Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14308 (GCVE-0-2019-14308)
Vulnerability from cvelistv5
Published
2019-08-26 13:28
Modified
2024-08-05 00:12
Severity ?
CWE
  • n/a
Summary
Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the LPD service. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:12:43.376Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh-usa.com/en/support-and-download"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh.com/info/2019/0823_1/"
          },
          {
            "name": "JVN#11708203",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the LPD service. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-13T04:06:08",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh-usa.com/en/support-and-download"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh.com/info/2019/0823_1/"
        },
        {
          "name": "JVN#11708203",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14308",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the LPD service. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ricoh-usa.com/en/support-and-download",
              "refsource": "MISC",
              "url": "https://www.ricoh-usa.com/en/support-and-download"
            },
            {
              "name": "https://www.ricoh.com/info/2019/0823_1/",
              "refsource": "MISC",
              "url": "https://www.ricoh.com/info/2019/0823_1/"
            },
            {
              "name": "JVN#11708203",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14308",
    "datePublished": "2019-08-26T13:28:30",
    "dateReserved": "2019-07-27T00:00:00",
    "dateUpdated": "2024-08-05T00:12:43.376Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14307 (GCVE-0-2019-14307)
Vulnerability from cvelistv5
Published
2019-08-26 14:18
Modified
2024-08-05 00:12
CWE
  • n/a
Summary
Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:12:43.520Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh-usa.com/en/support-and-download"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh.com/info/2019/0823_1/"
          },
          {
            "name": "JVN#11708203",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:U/UI:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-13T04:06:08",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh-usa.com/en/support-and-download"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh.com/info/2019/0823_1/"
        },
        {
          "name": "JVN#11708203",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14307",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:U/UI:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ricoh-usa.com/en/support-and-download",
              "refsource": "MISC",
              "url": "https://www.ricoh-usa.com/en/support-and-download"
            },
            {
              "name": "https://www.ricoh.com/info/2019/0823_1/",
              "refsource": "MISC",
              "url": "https://www.ricoh.com/info/2019/0823_1/"
            },
            {
              "name": "JVN#11708203",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14307",
    "datePublished": "2019-08-26T14:18:04",
    "dateReserved": "2019-07-27T00:00:00",
    "dateUpdated": "2024-08-05T00:12:43.520Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14309 (GCVE-0-2019-14309)
Vulnerability from cvelistv5
Published
2020-03-13 18:47
Modified
2024-08-05 00:12
Severity ?
CWE
  • n/a
Summary
Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:12:43.380Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ricoh-usa.com/en/support-and-download"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-13T18:47:15",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ricoh-usa.com/en/support-and-download"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14309",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ricoh-usa.com/en/support-and-download",
              "refsource": "MISC",
              "url": "https://www.ricoh-usa.com/en/support-and-download"
            },
            {
              "name": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/",
              "refsource": "MISC",
              "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14309",
    "datePublished": "2020-03-13T18:47:15",
    "dateReserved": "2019-07-27T00:00:00",
    "dateUpdated": "2024-08-05T00:12:43.380Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14304 (GCVE-0-2019-14304)
Vulnerability from cvelistv5
Published
2020-01-10 17:58
Modified
2024-08-05 00:12
Severity ?
CWE
  • n/a
Summary
Ricoh SP C250DN 1.06 devices allow CSRF.
References
https://www.ricoh.com/info/2019/0823_1/ x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN52962201/index.html third-party-advisory, x_refsource_JVN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:12:43.395Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ricoh.com/info/2019/0823_1/"
          },
          {
            "name": "JVN#52962201",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Ricoh SP C250DN 1.06 devices allow CSRF."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-25T04:06:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ricoh.com/info/2019/0823_1/"
        },
        {
          "name": "JVN#52962201",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14304",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ricoh SP C250DN 1.06 devices allow CSRF."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ricoh.com/info/2019/0823_1/",
              "refsource": "CONFIRM",
              "url": "https://www.ricoh.com/info/2019/0823_1/"
            },
            {
              "name": "JVN#52962201",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14304",
    "datePublished": "2020-01-10T17:58:30",
    "dateReserved": "2019-07-27T00:00:00",
    "dateUpdated": "2024-08-05T00:12:43.395Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14302 (GCVE-0-2019-14302)
Vulnerability from cvelistv5
Published
2020-01-10 17:59
Modified
2024-08-05 00:12
Severity ?
CWE
  • n/a
Summary
On Ricoh SP C250DN 1.06 devices, a debug port can be used.
References
https://www.ricoh.com/info/2019/0823_1/ x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN52962201/index.html third-party-advisory, x_refsource_JVN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:12:43.327Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ricoh.com/info/2019/0823_1/"
          },
          {
            "name": "JVN#52962201",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "On Ricoh SP C250DN 1.06 devices, a debug port can be used."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-25T04:06:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ricoh.com/info/2019/0823_1/"
        },
        {
          "name": "JVN#52962201",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-14302",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "On Ricoh SP C250DN 1.06 devices, a debug port can be used."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ricoh.com/info/2019/0823_1/",
              "refsource": "CONFIRM",
              "url": "https://www.ricoh.com/info/2019/0823_1/"
            },
            {
              "name": "JVN#52962201",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-14302",
    "datePublished": "2020-01-10T17:59:46",
    "dateReserved": "2019-07-27T00:00:00",
    "dateUpdated": "2024-08-05T00:12:43.327Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2020-01-10 18:15
Modified
2024-11-21 04:26
Summary
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2).
Impacted products
Vendor Product Version
ricoh sp_c250sf_firmware *
ricoh sp_c250sf -
ricoh sp_c252sf_firmware *
ricoh sp_c252sf -
ricoh sp_c250dn_firmware *
ricoh sp_c250dn -
ricoh sp_c252dn_firmware *
ricoh sp_c252dn -
ricoh m_c250fw_firmware *
ricoh m_c250fw -
ricoh m_c250fwb_firmware *
ricoh m_c250fwb -
ricoh p_c300w_firmware *
ricoh p_c300w -
ricoh p_c301w_firmware *
ricoh p_c301w -
ricoh sp_330sn_firmware *
ricoh sp_330sn -
ricoh sp_330sfn_firmware *
ricoh sp_330sfn -
ricoh sp_330dn_firmware *
ricoh sp_330dn -
ricoh sp_3710sf_firmware *
ricoh sp_3710sf -
ricoh sp_3710dn_firmware *
ricoh sp_3710dn -
ricoh sp_c260dnw_firmware *
ricoh sp_c260dnw -
ricoh sp_c260sfnw_firmware *
ricoh sp_c260sfnw -
ricoh sp_c261dnw_firmware *
ricoh sp_c261dnw -
ricoh sp_c261sfnw_firmware *
ricoh sp_c261sfnw -
ricoh sp_c262sfnw_firmware *
ricoh sp_c262sfnw -
ricoh sp_c262dnw_firmware *
ricoh sp_c262dnw -
ricoh mp_2014_firmware *
ricoh mp_2014 -
ricoh mp_2014d_firmware *
ricoh mp_2014d -
ricoh mp_2014ad_firmware *
ricoh mp_2014ad -
ricoh m_2700_firmware *
ricoh m_2700 -
ricoh m_2701_firmware *
ricoh m_2701 -
ricoh sp_221s_firmware *
ricoh sp_221s -
ricoh sp_220snw_firmware *
ricoh sp_220snw -
ricoh sp_221snw_firmware *
ricoh sp_221snw -
ricoh sp_221sf_firmware *
ricoh sp_221sf -
ricoh sp_220sfnw_firmware *
ricoh sp_220sfnw -
ricoh sp_221sfnw_firmware *
ricoh sp_221sfnw -
ricoh sp_277snwx_firmware *
ricoh sp_277snwx -
ricoh sp_277sfnwx_firmware *
ricoh sp_277sfnwx -
ricoh sp_221_firmware *
ricoh sp_221 -
ricoh sp_220nw_firmware *
ricoh sp_220nw -
ricoh sp_221nw_firmware *
ricoh sp_221nw -
ricoh sp277nwx_firmware *
ricoh sp277nwx -
ricoh sp_212snw_firmware *
ricoh sp_212snw -
ricoh sp_212sfnw_firmware *
ricoh sp_212sfnw -
ricoh sp_212sfw_firmware *
ricoh sp_212sfw -
ricoh sp_212sfnw_\(china\)_firmware *
ricoh sp_212sfnw_\(china\) -
ricoh sp_212suw_firmware *
ricoh sp_212suw -
ricoh sp_213snw_firmware *
ricoh sp_213snw -
ricoh sp_213snw_\(taiwan\)_firmware *
ricoh sp_213snw_\(taiwan\) -
ricoh sp_213suw_firmware *
ricoh sp_213suw -
ricoh sp_213sfnw_firmware *
ricoh sp_213sfnw -
ricoh sp_213sfw_firmware *
ricoh sp_213sfw -
ricoh sp_213sfnw_\(taiwan\)_firmware *
ricoh sp_213sfnw_\(taiwan\) -
ricoh sp_212nw_firmware *
ricoh sp_212nw -
ricoh sp_213nw_firmware *
ricoh sp_213nw -
ricoh sp_213nw_\(taiwan\)_firmware *
ricoh sp_213nw_\(taiwan\) -
ricoh sp_212w_firmware *
ricoh sp_212w -
ricoh sp_213w_firmware *
ricoh sp_213w -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A6CB78-5698-4977-A222-09E0BC68C4BC",
              "versionEndExcluding": "1.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54202E48-BBEC-4137-BFC3-8EDBDD7D48D0",
              "versionEndExcluding": "1.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F949759F-F079-45B3-8953-AD09C94928D5",
              "versionEndExcluding": "1.09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EA46496-7692-4D16-A510-1CDF66E0E159",
              "versionEndExcluding": "1.09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_c250fw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C084AAA8-A995-4BB4-8401-E69B5D2D6E47",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2295D3DC-AF14-49C4-851C-11BF07FCB29D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_c250fwb_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C009535C-0CAB-4170-BF77-D80F7E7FC2D2",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C99DFFE-3061-49B6-87FE-A9BFD85F50C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:p_c300w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E46DF1A5-0CD8-4E74-8DA2-829E2F0F0885",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9905DD-A2CD-41BA-92D9-AD68E891DFA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:p_c301w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59F15CA-17E2-4984-BE84-9EC002FD2961",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F9EADB-0852-447A-BB18-18AA37E1CEBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8899479F-4D08-4C7A-AF08-D18B33754A6D",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DD2FAEA-A30A-4F52-8C1D-25657F691C05",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE3ACF6-4691-4486-B6FD-B64886F8BBC5",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC14860-7610-48E1-9C81-C6F273B95D30",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF6BE33-59B0-4D61-9F4D-EC97071EFEAA",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61872571-F633-43AA-BEA5-9171B81C6147",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83B250D-7FA6-4BD8-9F78-4EDCB5000F1A",
              "versionEndExcluding": "1.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89A3FEA6-5EE6-4848-82A6-BD491E8BB9F6",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9A37D2-F0EE-4ACF-9E60-B7717EC7EAD6",
              "versionEndExcluding": "1.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CAFF590-A772-42DE-8800-0081EB60CE4C",
              "versionEndExcluding": "1.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA9EF1CA-E1F3-40AD-9FDB-64AB24C61F71",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "664A7AFD-16E2-4AB4-A409-40596522C638",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "280ED6CC-B977-4C9B-8EC4-FAB605C39BC1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24BBEED4-7C10-4A46-9523-865348B5A40C",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92C14354-14B2-4202-A9B8-BB65B0A3BFF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76B05D10-5E4D-4239-B7A7-59540EA8130D",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C5B0A32-50BD-4A9C-B7DA-E6E1D20750F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D92CC2-0EFC-43E2-B0A3-A332F85E5147",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A5FDEBF-EB68-417E-AF0D-1E9D786E019B",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6283DF5E-A2AC-46AA-9DEB-B76DEB52C977",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2135C13B-5395-4FAC-979C-6CAD20EE221F",
              "versionEndExcluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DAE05B-374A-4149-A2FC-0F9246299AAC",
              "versionEndExcluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B16367-B607-4348-9A1B-3D9D7BE6E3C3",
              "versionEndExcluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B403690-F713-4253-AAFF-A29FBED8AA71",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F2A3DA7-BEAE-4C71-A0DD-D5D65273CB31",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F7D26BE-4814-4814-AB29-45170C6236CD",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEF64BC9-4F3A-4E18-AE32-04E6C6627D91",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2746858-D63D-4AFF-8DED-BF7C8F2BDC93",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D13A2A-0870-4E48-8309-8A73B9DA9788",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BD6DBA-8298-4CBD-AB0A-86CF9543EB51",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49641455-13A9-4067-94BC-BAD0DF948E2D",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FDB22E5-02F5-4CF5-A486-2D85FCFA0855",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9143906C-717E-4B13-B18F-5345ECCC5813",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A049DB-EABF-47CE-871E-E2953B0B0336",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB4C236-437E-40BE-99E1-5B87A5EDF43D",
              "versionEndExcluding": "1.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3DD8B9-B020-4A9C-9483-59608AF34836",
              "versionEndExcluding": "1.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6CAA8A-9249-4A83-8303-DCD497A3D403",
              "versionEndExcluding": "1.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17D78F4E-3E5F-4429-91D0-00CDB654BE70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC6479E-7D1E-4E75-9655-CC5078EEC971",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D61DE5-4A98-4C38-BE1C-0A201E3DE798",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4F82C96-8A84-4758-B751-2E4EB402D2FF",
              "versionEndExcluding": "1.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CC2924A-4E60-4CD4-9E54-411BE8E100C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "75F79B35-46E0-4690-8C27-CA4566F33EAF",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D860DCF2-327E-4C44-A37D-7DBC73D2CAC4",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3335E-8963-4134-AAD4-E94DC644BA79",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "590D1992-6123-47C9-A546-BB758754B5D7",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFD58F60-2EA2-4833-9D8B-F85AF0B81719",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05CF252-3A6C-4C51-B3DF-2BBD20BD8AC2",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D16EF7B-4C5C-4BB5-AAE3-8891748F6206",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "065D4968-67D4-4F7D-B359-9A792458AE32",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD02F8F2-E629-4FDA-BCFA-71BA3A64E8D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D70DEF67-E3FA-4725-A5CB-4DCCF4B93809",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA066087-C58B-41D8-ABAC-FC35EB208DEE",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2)."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.06, tienen un Control de Acceso Incorrecto (problema 1 de 2)."
    }
  ],
  "id": "CVE-2019-14301",
  "lastModified": "2024-11-21T04:26:26.527",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-10T18:15:11.333",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-03-13 19:15
Modified
2024-11-21 04:26
Summary
Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D5B3F9E-EFE6-4B4D-A77D-857543C5FD7A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12DDFC54-73AD-474E-9150-ED2FBB418ECE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:1.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA52538-4A4E-4927-A7EB-38D14B384FA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA1CCD6-3773-45A1-9A3D-31235783B2C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.05, presenta una contrase\u00f1a fija. Se detect\u00f3 que la credencial del servicio FTP estaba embebida dentro del firmware de la impresora. Esto permitir\u00eda a un atacante acceder y leer la informaci\u00f3n almacenada en las carpetas compartidas del FTP."
    }
  ],
  "id": "CVE-2019-14309",
  "lastModified": "2024-11-21T04:26:28.030",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-03-13T19:15:16.837",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-798"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-08-26 15:15
Modified
2024-11-21 04:26
Summary
Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "775D91D0-68A3-4FEA-86F0-F4D408477732",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E807AEA0-1B04-4D20-B07A-DCFDF15892C9",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE51E36-799C-4466-92E5-AB3965E0A562",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F8BC805-7C0F-4C59-8C7F-930899951F27",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
    },
    {
      "lang": "es",
      "value": "Varias impresoras Ricoh presentan m\u00faltiples desbordamientos de b\u00fafer al analizar la configuraci\u00f3n de par\u00e1metros HTTP para Wi-Fi, mDNS, POP3, SMTP y alertas de notificaci\u00f3n, lo que permite a un atacante causar una denegaci\u00f3n de servicio o ejecuci\u00f3n de c\u00f3digo por medio de peticiones dise\u00f1adas hacia el servidor web. Las versiones de firmware afectadas dependen de los modelos de impresora. Una configuraci\u00f3n afectada es cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* hasta versi\u00f3n 1.06 inclusive ejecut\u00e1ndose en cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Otra configuraci\u00f3n afectada es cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* hasta versi\u00f3n 1.12 inclusive ejecut\u00e1ndose en cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
    }
  ],
  "id": "CVE-2019-14305",
  "lastModified": "2024-11-21T04:26:27.340",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "cve@mitre.org",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-08-26T15:15:11.737",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-08-26 14:15
Modified
2024-11-21 04:26
Summary
Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the LPD service. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "775D91D0-68A3-4FEA-86F0-F4D408477732",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E807AEA0-1B04-4D20-B07A-DCFDF15892C9",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE51E36-799C-4466-92E5-AB3965E0A562",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F8BC805-7C0F-4C59-8C7F-930899951F27",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the LPD service. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
    },
    {
      "lang": "es",
      "value": "Varias impresoras Ricoh tienen m\u00faltiples desbordamientos de b\u00fafer que analizan paquetes LPD, lo que permite que un atacante provoque una denegaci\u00f3n de servicio o ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de solicitudes dise\u00f1adas para el servicio LPD. Las versiones de firmware afectadas dependen de los modelos de impresora. Una configuraci\u00f3n afectada es cpe: 2.3: o: ricoh: sp_c250dn_firmware: -: *: *: *: *: *: *: * hasta (incluido) 1.06 ejecut\u00e1ndose en cpe: 2.3: o: ricoh: sp_c250dn: -: * : *: *: *: *: *: *, cpe: 2.3: o: ricoh: sp_c252dn: -: *: *: *: *: *: *: *. Otra configuraci\u00f3n afectada es cpe: 2.3: o: ricoh: sp_c250sf_firmware: -: *: *: *: *: *: *: * hasta 1.12 inclusive ejecut\u00e1ndose en cpe: 2.3: o: ricoh: sp_c250sf: -: * : *: *: *: *: *: *, cpe: 2.3: o: ricoh: sp_c252sf: -: *: *: *: *: *: *: *."
    }
  ],
  "id": "CVE-2019-14308",
  "lastModified": "2024-11-21T04:26:27.880",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "cve@mitre.org",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-08-26T14:15:10.797",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-08-26 15:15
Modified
2024-11-21 04:26
Summary
Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "775D91D0-68A3-4FEA-86F0-F4D408477732",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E807AEA0-1B04-4D20-B07A-DCFDF15892C9",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE51E36-799C-4466-92E5-AB3965E0A562",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F8BC805-7C0F-4C59-8C7F-930899951F27",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
    },
    {
      "lang": "es",
      "value": "Varias impresoras Ricoh presentan m\u00faltiples desbordamientos de b\u00fafer al analizar las cabeceras HTTP cookie, lo que permite a un atacante causar una denegaci\u00f3n de servicio o ejecuci\u00f3n de c\u00f3digo por medio de peticiones dise\u00f1adas hacia el servidor web. Las versiones de firmware afectadas dependen de los modelos de impresora. Una configuraci\u00f3n afectada es cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* hasta la versi\u00f3n 1.06 inclusive ejecut\u00e1ndose en cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Otra configuraci\u00f3n afectada es cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:*hasta la versi\u00f3n 1.12 inclusive ejecut\u00e1ndose en cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
    }
  ],
  "id": "CVE-2019-14300",
  "lastModified": "2024-11-21T04:26:24.987",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "cve@mitre.org",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-08-26T15:15:11.687",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-03-13 19:15
Modified
2024-11-21 04:26
Severity ?
Summary
Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D5B3F9E-EFE6-4B4D-A77D-857543C5FD7A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12DDFC54-73AD-474E-9150-ED2FBB418ECE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:1.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA52538-4A4E-4927-A7EB-38D14B384FA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA1CCD6-3773-45A1-9A3D-31235783B2C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets"
    },
    {
      "lang": "es",
      "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.05, permiten una denegaci\u00f3n de servicio (problema 2 de 3).  Los paquetes dise\u00f1ados no autenticados en el servicio IPP causar\u00e1n que un dispositivo vulnerable se bloquee.  Se ha identificado una corrupci\u00f3n de la memoria en la manera en como el dispositivo incorporado analiz\u00f3 los paquetes IPP"
    }
  ],
  "id": "CVE-2019-14310",
  "lastModified": "2024-11-21T04:26:28.177",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-03-13T19:15:16.917",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-10 18:15
Modified
2024-11-21 04:26
Summary
Ricoh SP C250DN 1.06 devices allow CSRF.
Impacted products
Vendor Product Version
ricoh sp_c250sf_firmware *
ricoh sp_c250sf -
ricoh sp_c252sf_firmware *
ricoh sp_c252sf -
ricoh sp_c250dn_firmware *
ricoh sp_c250dn -
ricoh sp_c252dn_firmware *
ricoh sp_c252dn -
ricoh m_c250fw_firmware *
ricoh m_c250fw -
ricoh m_c250fwb_firmware *
ricoh m_c250fwb -
ricoh p_c300w_firmware *
ricoh p_c300w -
ricoh p_c301w_firmware *
ricoh p_c301w -
ricoh sp_330sn_firmware *
ricoh sp_330sn -
ricoh sp_330sfn_firmware *
ricoh sp_330sfn -
ricoh sp_330dn_firmware *
ricoh sp_330dn -
ricoh sp_3710sf_firmware *
ricoh sp_3710sf -
ricoh sp_3710dn_firmware *
ricoh sp_3710dn -
ricoh sp_c260dnw_firmware *
ricoh sp_c260dnw -
ricoh sp_c260sfnw_firmware *
ricoh sp_c260sfnw -
ricoh sp_c261dnw_firmware *
ricoh sp_c261dnw -
ricoh sp_c261sfnw_firmware *
ricoh sp_c261sfnw -
ricoh sp_c262sfnw_firmware *
ricoh sp_c262sfnw -
ricoh sp_c262dnw_firmware *
ricoh sp_c262dnw -
ricoh mp_2014_firmware *
ricoh mp_2014 -
ricoh mp_2014d_firmware *
ricoh mp_2014d -
ricoh mp_2014ad_firmware *
ricoh mp_2014ad -
ricoh m_2700_firmware *
ricoh m_2700 -
ricoh m_2701_firmware *
ricoh m_2701 -
ricoh sp_221s_firmware *
ricoh sp_221s -
ricoh sp_220snw_firmware *
ricoh sp_220snw -
ricoh sp_221snw_firmware *
ricoh sp_221snw -
ricoh sp_221sf_firmware *
ricoh sp_221sf -
ricoh sp_220sfnw_firmware *
ricoh sp_220sfnw -
ricoh sp_221sfnw_firmware *
ricoh sp_221sfnw -
ricoh sp_277snwx_firmware *
ricoh sp_277snwx -
ricoh sp_277sfnwx_firmware *
ricoh sp_277sfnwx -
ricoh sp_221_firmware *
ricoh sp_221 -
ricoh sp_220nw_firmware *
ricoh sp_220nw -
ricoh sp_221nw_firmware *
ricoh sp_221nw -
ricoh sp277nwx_firmware *
ricoh sp277nwx -
ricoh sp_212snw_firmware *
ricoh sp_212snw -
ricoh sp_212sfnw_firmware *
ricoh sp_212sfnw -
ricoh sp_212sfw_firmware *
ricoh sp_212sfw -
ricoh sp_212sfnw_\(china\)_firmware *
ricoh sp_212sfnw_\(china\) -
ricoh sp_212suw_firmware *
ricoh sp_212suw -
ricoh sp_213snw_firmware *
ricoh sp_213snw -
ricoh sp_213snw_\(taiwan\)_firmware *
ricoh sp_213snw_\(taiwan\) -
ricoh sp_213suw_firmware *
ricoh sp_213suw -
ricoh sp_213sfnw_firmware *
ricoh sp_213sfnw -
ricoh sp_213sfw_firmware *
ricoh sp_213sfw -
ricoh sp_213sfnw_\(taiwan\)_firmware *
ricoh sp_213sfnw_\(taiwan\) -
ricoh sp_212nw_firmware *
ricoh sp_212nw -
ricoh sp_213nw_firmware *
ricoh sp_213nw -
ricoh sp_213nw_\(taiwan\)_firmware *
ricoh sp_213nw_\(taiwan\) -
ricoh sp_212w_firmware *
ricoh sp_212w -
ricoh sp_213w_firmware *
ricoh sp_213w -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A6CB78-5698-4977-A222-09E0BC68C4BC",
              "versionEndExcluding": "1.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54202E48-BBEC-4137-BFC3-8EDBDD7D48D0",
              "versionEndExcluding": "1.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F949759F-F079-45B3-8953-AD09C94928D5",
              "versionEndExcluding": "1.09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EA46496-7692-4D16-A510-1CDF66E0E159",
              "versionEndExcluding": "1.09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_c250fw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C084AAA8-A995-4BB4-8401-E69B5D2D6E47",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2295D3DC-AF14-49C4-851C-11BF07FCB29D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_c250fwb_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C009535C-0CAB-4170-BF77-D80F7E7FC2D2",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C99DFFE-3061-49B6-87FE-A9BFD85F50C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:p_c300w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E46DF1A5-0CD8-4E74-8DA2-829E2F0F0885",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9905DD-A2CD-41BA-92D9-AD68E891DFA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:p_c301w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59F15CA-17E2-4984-BE84-9EC002FD2961",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F9EADB-0852-447A-BB18-18AA37E1CEBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8899479F-4D08-4C7A-AF08-D18B33754A6D",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DD2FAEA-A30A-4F52-8C1D-25657F691C05",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE3ACF6-4691-4486-B6FD-B64886F8BBC5",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC14860-7610-48E1-9C81-C6F273B95D30",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF6BE33-59B0-4D61-9F4D-EC97071EFEAA",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61872571-F633-43AA-BEA5-9171B81C6147",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83B250D-7FA6-4BD8-9F78-4EDCB5000F1A",
              "versionEndExcluding": "1.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89A3FEA6-5EE6-4848-82A6-BD491E8BB9F6",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9A37D2-F0EE-4ACF-9E60-B7717EC7EAD6",
              "versionEndExcluding": "1.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CAFF590-A772-42DE-8800-0081EB60CE4C",
              "versionEndExcluding": "1.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA9EF1CA-E1F3-40AD-9FDB-64AB24C61F71",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "664A7AFD-16E2-4AB4-A409-40596522C638",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "280ED6CC-B977-4C9B-8EC4-FAB605C39BC1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24BBEED4-7C10-4A46-9523-865348B5A40C",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92C14354-14B2-4202-A9B8-BB65B0A3BFF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76B05D10-5E4D-4239-B7A7-59540EA8130D",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C5B0A32-50BD-4A9C-B7DA-E6E1D20750F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D92CC2-0EFC-43E2-B0A3-A332F85E5147",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A5FDEBF-EB68-417E-AF0D-1E9D786E019B",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6283DF5E-A2AC-46AA-9DEB-B76DEB52C977",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2135C13B-5395-4FAC-979C-6CAD20EE221F",
              "versionEndExcluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DAE05B-374A-4149-A2FC-0F9246299AAC",
              "versionEndExcluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B16367-B607-4348-9A1B-3D9D7BE6E3C3",
              "versionEndExcluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B403690-F713-4253-AAFF-A29FBED8AA71",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F2A3DA7-BEAE-4C71-A0DD-D5D65273CB31",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F7D26BE-4814-4814-AB29-45170C6236CD",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEF64BC9-4F3A-4E18-AE32-04E6C6627D91",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2746858-D63D-4AFF-8DED-BF7C8F2BDC93",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D13A2A-0870-4E48-8309-8A73B9DA9788",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BD6DBA-8298-4CBD-AB0A-86CF9543EB51",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49641455-13A9-4067-94BC-BAD0DF948E2D",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FDB22E5-02F5-4CF5-A486-2D85FCFA0855",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9143906C-717E-4B13-B18F-5345ECCC5813",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A049DB-EABF-47CE-871E-E2953B0B0336",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB4C236-437E-40BE-99E1-5B87A5EDF43D",
              "versionEndExcluding": "1.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3DD8B9-B020-4A9C-9483-59608AF34836",
              "versionEndExcluding": "1.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6CAA8A-9249-4A83-8303-DCD497A3D403",
              "versionEndExcluding": "1.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17D78F4E-3E5F-4429-91D0-00CDB654BE70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC6479E-7D1E-4E75-9655-CC5078EEC971",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D61DE5-4A98-4C38-BE1C-0A201E3DE798",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4F82C96-8A84-4758-B751-2E4EB402D2FF",
              "versionEndExcluding": "1.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CC2924A-4E60-4CD4-9E54-411BE8E100C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "75F79B35-46E0-4690-8C27-CA4566F33EAF",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D860DCF2-327E-4C44-A37D-7DBC73D2CAC4",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3335E-8963-4134-AAD4-E94DC644BA79",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "590D1992-6123-47C9-A546-BB758754B5D7",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFD58F60-2EA2-4833-9D8B-F85AF0B81719",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05CF252-3A6C-4C51-B3DF-2BBD20BD8AC2",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D16EF7B-4C5C-4BB5-AAE3-8891748F6206",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "065D4968-67D4-4F7D-B359-9A792458AE32",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD02F8F2-E629-4FDA-BCFA-71BA3A64E8D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D70DEF67-E3FA-4725-A5CB-4DCCF4B93809",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA066087-C58B-41D8-ABAC-FC35EB208DEE",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Ricoh SP C250DN 1.06 devices allow CSRF."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.06, permite un ataque de tipo CSRF."
    }
  ],
  "id": "CVE-2019-14304",
  "lastModified": "2024-11-21T04:26:27.137",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-10T18:15:11.507",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-08-26 15:15
Modified
2024-11-21 04:26
Summary
Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "775D91D0-68A3-4FEA-86F0-F4D408477732",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E807AEA0-1B04-4D20-B07A-DCFDF15892C9",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE51E36-799C-4466-92E5-AB3965E0A562",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F8BC805-7C0F-4C59-8C7F-930899951F27",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
    },
    {
      "lang": "es",
      "value": "Varias impresoras Ricoh presentan m\u00faltiples desbordamientos de b\u00fafer al analizar la configuraci\u00f3n de par\u00e1metros HTTP para SNMP, lo que permite a un atacante causar una denegaci\u00f3n de servicio o ejecuci\u00f3n de c\u00f3digo por medio de peticiones dise\u00f1adas hacia el servidor web. Las versiones de firmware afectadas dependen de los modelos de impresora. Una configuraci\u00f3n afectada es cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* hasta la versi\u00f3n 1.06 inclusive ejecut\u00e1ndose en cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Otra configuraci\u00f3n afectada es cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:*hasta la versi\u00f3n 1.12 inclusive ejecut\u00e1ndose en cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*."
    }
  ],
  "id": "CVE-2019-14307",
  "lastModified": "2024-11-21T04:26:27.720",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "cve@mitre.org",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-08-26T15:15:11.797",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN11708203/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-10 18:15
Modified
2024-11-21 04:26
Summary
On Ricoh SP C250DN 1.06 devices, a debug port can be used.
Impacted products
Vendor Product Version
ricoh sp_c250sf_firmware *
ricoh sp_c250sf -
ricoh sp_c252sf_firmware *
ricoh sp_c252sf -
ricoh sp_c250dn_firmware *
ricoh sp_c250dn -
ricoh sp_c252dn_firmware *
ricoh sp_c252dn -
ricoh sp_330sn_firmware *
ricoh sp_330sn -
ricoh sp_330sfn_firmware *
ricoh sp_330sfn -
ricoh sp_330dn_firmware *
ricoh sp_330dn -
ricoh sp_3710sf_firmware *
ricoh sp_3710sf -
ricoh sp_3710dn_firmware *
ricoh sp_3710dn -
ricoh sp_c260dnw_firmware *
ricoh sp_c260dnw -
ricoh sp_c260sfnw_firmware *
ricoh sp_c260sfnw -
ricoh sp_c261dnw_firmware *
ricoh sp_c261dnw -
ricoh sp_c261sfnw_firmware *
ricoh sp_c261sfnw -
ricoh sp_c262sfnw_firmware *
ricoh sp_c262sfnw -
ricoh sp_c262dnw_firmware *
ricoh sp_c262dnw -
ricoh mp_2014_firmware *
ricoh mp_2014 -
ricoh mp_2014d_firmware *
ricoh mp_2014d -
ricoh mp_2014ad_firmware *
ricoh mp_2014ad -
ricoh m_2700_firmware *
ricoh m_2700 -
ricoh m_2701_firmware *
ricoh m_2701 -
ricoh sp_221s_firmware *
ricoh sp_221s -
ricoh sp_220snw_firmware *
ricoh sp_220snw -
ricoh sp_221snw_firmware *
ricoh sp_221snw -
ricoh sp_221sf_firmware *
ricoh sp_221sf -
ricoh sp_220sfnw_firmware *
ricoh sp_220sfnw -
ricoh sp_221sfnw_firmware *
ricoh sp_221sfnw -
ricoh sp_277snwx_firmware *
ricoh sp_277snwx -
ricoh sp_277sfnwx_firmware *
ricoh sp_277sfnwx -
ricoh sp_221_firmware *
ricoh sp_221 -
ricoh sp_220nw_firmware *
ricoh sp_220nw -
ricoh sp_221nw_firmware *
ricoh sp_221nw -
ricoh sp277nwx_firmware *
ricoh sp277nwx -
ricoh sp_212snw_firmware *
ricoh sp_212snw -
ricoh sp_212sfnw_firmware *
ricoh sp_212sfnw -
ricoh sp_212sfw_firmware *
ricoh sp_212sfw -
ricoh sp_212sfnw_\(china\)_firmware *
ricoh sp_212sfnw_\(china\) -
ricoh sp_212suw_firmware *
ricoh sp_212suw -
ricoh sp_213snw_firmware *
ricoh sp_213snw -
ricoh sp_213snw_\(taiwan\)_firmware *
ricoh sp_213snw_\(taiwan\) -
ricoh sp_213suw_firmware *
ricoh sp_213suw -
ricoh sp_213sfnw_firmware *
ricoh sp_213sfnw -
ricoh sp_213sfw_firmware *
ricoh sp_213sfw -
ricoh sp_213sfnw_\(taiwan\)_firmware *
ricoh sp_213sfnw_\(taiwan\) -
ricoh sp_212nw_firmware *
ricoh sp_212nw -
ricoh sp_213nw_firmware *
ricoh sp_213nw -
ricoh sp_213nw_\(taiwan\)_firmware *
ricoh sp_213nw_\(taiwan\) -
ricoh sp_212w_firmware *
ricoh sp_212w -
ricoh sp_213w_firmware *
ricoh sp_213w -
ricoh sp_210su_\(china\)_firmware *
ricoh sp_210su -
ricoh sp_210su_q_\(china\)_firmware *
ricoh sp_210su_q_\(china\) -
ricoh sp_210su_firmware *
ricoh sp_210su -
ricoh sp_210sf_firmware *
ricoh sp_210sf -
ricoh sp_210sf_\(china\)_firmware *
ricoh sp_210sf_\(china\) -
ricoh sp_210sf_q_\(china\)_firmware *
ricoh sp_210sf_q_\(china\) -
ricoh sp_211sf_firmware *
ricoh sp_211sf -
ricoh sp_211su_firmware *
ricoh sp_211su -
ricoh sp_210_firmware *
ricoh sp_210 -
ricoh sp_210_\(china\)_firmware *
ricoh sp_210_\(china\) -
ricoh sp_210_q_\(china\)_firmware *
ricoh sp_210_q_\(china\) -
ricoh sp_210e_\(china\)_firmware *
ricoh sp_210e_\(china\) -
ricoh sp_211_firmware *
ricoh sp_211 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A6CB78-5698-4977-A222-09E0BC68C4BC",
              "versionEndExcluding": "1.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54202E48-BBEC-4137-BFC3-8EDBDD7D48D0",
              "versionEndExcluding": "1.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F949759F-F079-45B3-8953-AD09C94928D5",
              "versionEndExcluding": "1.09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EA46496-7692-4D16-A510-1CDF66E0E159",
              "versionEndExcluding": "1.09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8899479F-4D08-4C7A-AF08-D18B33754A6D",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DD2FAEA-A30A-4F52-8C1D-25657F691C05",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE3ACF6-4691-4486-B6FD-B64886F8BBC5",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC14860-7610-48E1-9C81-C6F273B95D30",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF6BE33-59B0-4D61-9F4D-EC97071EFEAA",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61872571-F633-43AA-BEA5-9171B81C6147",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83B250D-7FA6-4BD8-9F78-4EDCB5000F1A",
              "versionEndExcluding": "1.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89A3FEA6-5EE6-4848-82A6-BD491E8BB9F6",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9A37D2-F0EE-4ACF-9E60-B7717EC7EAD6",
              "versionEndExcluding": "1.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CAFF590-A772-42DE-8800-0081EB60CE4C",
              "versionEndExcluding": "1.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA9EF1CA-E1F3-40AD-9FDB-64AB24C61F71",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "664A7AFD-16E2-4AB4-A409-40596522C638",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "280ED6CC-B977-4C9B-8EC4-FAB605C39BC1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24BBEED4-7C10-4A46-9523-865348B5A40C",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92C14354-14B2-4202-A9B8-BB65B0A3BFF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76B05D10-5E4D-4239-B7A7-59540EA8130D",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C5B0A32-50BD-4A9C-B7DA-E6E1D20750F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D92CC2-0EFC-43E2-B0A3-A332F85E5147",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A5FDEBF-EB68-417E-AF0D-1E9D786E019B",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6283DF5E-A2AC-46AA-9DEB-B76DEB52C977",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2135C13B-5395-4FAC-979C-6CAD20EE221F",
              "versionEndExcluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DAE05B-374A-4149-A2FC-0F9246299AAC",
              "versionEndExcluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B16367-B607-4348-9A1B-3D9D7BE6E3C3",
              "versionEndExcluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B403690-F713-4253-AAFF-A29FBED8AA71",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F2A3DA7-BEAE-4C71-A0DD-D5D65273CB31",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F7D26BE-4814-4814-AB29-45170C6236CD",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEF64BC9-4F3A-4E18-AE32-04E6C6627D91",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2746858-D63D-4AFF-8DED-BF7C8F2BDC93",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D13A2A-0870-4E48-8309-8A73B9DA9788",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BD6DBA-8298-4CBD-AB0A-86CF9543EB51",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49641455-13A9-4067-94BC-BAD0DF948E2D",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FDB22E5-02F5-4CF5-A486-2D85FCFA0855",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9143906C-717E-4B13-B18F-5345ECCC5813",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A049DB-EABF-47CE-871E-E2953B0B0336",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB4C236-437E-40BE-99E1-5B87A5EDF43D",
              "versionEndExcluding": "1.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3DD8B9-B020-4A9C-9483-59608AF34836",
              "versionEndExcluding": "1.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6CAA8A-9249-4A83-8303-DCD497A3D403",
              "versionEndExcluding": "1.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17D78F4E-3E5F-4429-91D0-00CDB654BE70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC6479E-7D1E-4E75-9655-CC5078EEC971",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D61DE5-4A98-4C38-BE1C-0A201E3DE798",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4F82C96-8A84-4758-B751-2E4EB402D2FF",
              "versionEndExcluding": "1.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CC2924A-4E60-4CD4-9E54-411BE8E100C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "75F79B35-46E0-4690-8C27-CA4566F33EAF",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D860DCF2-327E-4C44-A37D-7DBC73D2CAC4",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3335E-8963-4134-AAD4-E94DC644BA79",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "590D1992-6123-47C9-A546-BB758754B5D7",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFD58F60-2EA2-4833-9D8B-F85AF0B81719",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05CF252-3A6C-4C51-B3DF-2BBD20BD8AC2",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D16EF7B-4C5C-4BB5-AAE3-8891748F6206",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "065D4968-67D4-4F7D-B359-9A792458AE32",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD02F8F2-E629-4FDA-BCFA-71BA3A64E8D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D70DEF67-E3FA-4725-A5CB-4DCCF4B93809",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA066087-C58B-41D8-ABAC-FC35EB208DEE",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_210su_\\(china\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A302D2-8EA9-4770-B797-54B4A68268E9",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_210su:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D3B1B91-C752-4177-9098-76F96A910509",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_210su_q_\\(china\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "949F5C47-DEE4-4F01-90E4-E9A577A4DE3A",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_210su_q_\\(china\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16604595-6307-47CB-A453-F6F2AA107C4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_210su_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E166CCF1-C5FF-4A10-A9D9-43AB71A42B76",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_210su:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB3FB195-30AE-4EAE-A290-EED2F9D1E380",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_210sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1EC8A5-E37B-4BC7-851F-B8A349C0C02F",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_210sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5201E788-DFCD-4288-BC3C-1082F2B48241",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_210sf_\\(china\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55A4856-E7A8-4022-8588-EC65FC6DD985",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_210sf_\\(china\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B73D8E6B-5870-468B-BFE6-72829AFE0896",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_210sf_q_\\(china\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68799164-71D7-48C5-9A26-6907D96F69F6",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_210sf_q_\\(china\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13D69E95-5F4A-431A-BB52-35778AC12B3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_211sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D03A34-4FAA-4AE5-92D2-22373A184AE4",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_211sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4B3755-1B04-4C7A-9FFD-ED59CDF49B54",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_211su_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "75F9C3AB-3D8F-4FAD-8017-127D193A7633",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_211su:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D04427-93BC-4400-B183-1A4550F1E600",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2EDF78-9E24-4F94-B809-69540E879923",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D81037-C1CE-482C-8585-F11C38A227C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_210_\\(china\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C102DB1-363E-4ACB-8805-D1C2814DF1BD",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_210_\\(china\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10D2575-8537-4936-9D19-51C9DB0C4674",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_210_q_\\(china\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E89CF45-58F5-4914-8D07-EA41468C41E2",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_210_q_\\(china\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "034A4759-4B33-4EB2-9959-31C387A27FB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_210e_\\(china\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D854FB4-6B89-4527-854D-DA6EE5F4A34E",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_210e_\\(china\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "136865AF-C26B-41D2-917E-1B5722EF51FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E581A4F-FA5B-43F7-83CF-4376AE5A760D",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73C578D8-6AB7-4A89-BC26-5A214128D0A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "On Ricoh SP C250DN 1.06 devices, a debug port can be used."
    },
    {
      "lang": "es",
      "value": "En dispositivos Ricoh SP C250DN versi\u00f3n 1.06, un puerto de depuraci\u00f3n puede ser usado."
    }
  ],
  "id": "CVE-2019-14302",
  "lastModified": "2024-11-21T04:26:26.787",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-10T18:15:11.413",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-10 18:15
Modified
2024-11-21 04:26
Summary
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2).
Impacted products
Vendor Product Version
ricoh sp_c250sf_firmware *
ricoh sp_c250sf -
ricoh sp_c252sf_firmware *
ricoh sp_c252sf -
ricoh sp_c250dn_firmware *
ricoh sp_c250dn -
ricoh sp_c252dn_firmware *
ricoh sp_c252dn -
ricoh sp_330sn_firmware *
ricoh sp_330sn -
ricoh sp_330sfn_firmware *
ricoh sp_330sfn -
ricoh sp_330dn_firmware *
ricoh sp_330dn -
ricoh sp_3710sf_firmware *
ricoh sp_3710sf -
ricoh sp_3710dn_firmware *
ricoh sp_3710dn -
ricoh sp_c260dnw_firmware *
ricoh sp_c260dnw -
ricoh sp_c260sfnw_firmware *
ricoh sp_c260sfnw -
ricoh sp_c261dnw_firmware *
ricoh sp_c261dnw -
ricoh sp_c261sfnw_firmware *
ricoh sp_c261sfnw -
ricoh sp_c262sfnw_firmware *
ricoh sp_c262sfnw -
ricoh sp_c262dnw_firmware *
ricoh sp_c262dnw -
ricoh mp_2014_firmware *
ricoh mp_2014 -
ricoh mp_2014d_firmware *
ricoh mp_2014d -
ricoh mp_2014ad_firmware *
ricoh mp_2014ad -
ricoh m_2700_firmware *
ricoh m_2700 -
ricoh m_2701_firmware *
ricoh m_2701 -
ricoh sp_221s_firmware *
ricoh sp_221s -
ricoh sp_220snw_firmware *
ricoh sp_220snw -
ricoh sp_221snw_firmware *
ricoh sp_221snw -
ricoh sp_221sf_firmware *
ricoh sp_221sf -
ricoh sp_220sfnw_firmware *
ricoh sp_220sfnw -
ricoh sp_221sfnw_firmware *
ricoh sp_221sfnw -
ricoh sp_277snwx_firmware *
ricoh sp_277snwx -
ricoh sp_277sfnwx_firmware *
ricoh sp_277sfnwx -
ricoh sp_221_firmware *
ricoh sp_221 -
ricoh sp_220nw_firmware *
ricoh sp_220nw -
ricoh sp_221nw_firmware *
ricoh sp_221nw -
ricoh sp277nwx_firmware *
ricoh sp277nwx -
ricoh sp_212snw_firmware *
ricoh sp_212snw -
ricoh sp_212sfnw_firmware *
ricoh sp_212sfnw -
ricoh sp_212sfw_firmware *
ricoh sp_212sfw -
ricoh sp_212sfnw_\(china\)_firmware *
ricoh sp_212sfnw_\(china\) -
ricoh sp_212suw_firmware *
ricoh sp_212suw -
ricoh sp_213snw_firmware *
ricoh sp_213snw -
ricoh sp_213snw_\(taiwan\)_firmware *
ricoh sp_213snw_\(taiwan\) -
ricoh sp_213suw_firmware *
ricoh sp_213suw -
ricoh sp_213sfnw_firmware *
ricoh sp_213sfnw -
ricoh sp_213sfw_firmware *
ricoh sp_213sfw -
ricoh sp_213sfnw_\(taiwan\)_firmware *
ricoh sp_213sfnw_\(taiwan\) -
ricoh sp_212nw_firmware *
ricoh sp_212nw -
ricoh sp_213nw_firmware *
ricoh sp_213nw -
ricoh sp_213nw_\(taiwan\)_firmware *
ricoh sp_213nw_\(taiwan\) -
ricoh sp_212w_firmware *
ricoh sp_212w -
ricoh sp_213w_firmware *
ricoh sp_213w -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A6CB78-5698-4977-A222-09E0BC68C4BC",
              "versionEndExcluding": "1.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54202E48-BBEC-4137-BFC3-8EDBDD7D48D0",
              "versionEndExcluding": "1.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F949759F-F079-45B3-8953-AD09C94928D5",
              "versionEndExcluding": "1.09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EA46496-7692-4D16-A510-1CDF66E0E159",
              "versionEndExcluding": "1.09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8899479F-4D08-4C7A-AF08-D18B33754A6D",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DD2FAEA-A30A-4F52-8C1D-25657F691C05",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE3ACF6-4691-4486-B6FD-B64886F8BBC5",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC14860-7610-48E1-9C81-C6F273B95D30",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF6BE33-59B0-4D61-9F4D-EC97071EFEAA",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61872571-F633-43AA-BEA5-9171B81C6147",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83B250D-7FA6-4BD8-9F78-4EDCB5000F1A",
              "versionEndExcluding": "1.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89A3FEA6-5EE6-4848-82A6-BD491E8BB9F6",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9A37D2-F0EE-4ACF-9E60-B7717EC7EAD6",
              "versionEndExcluding": "1.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CAFF590-A772-42DE-8800-0081EB60CE4C",
              "versionEndExcluding": "1.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA9EF1CA-E1F3-40AD-9FDB-64AB24C61F71",
              "versionEndExcluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "664A7AFD-16E2-4AB4-A409-40596522C638",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "280ED6CC-B977-4C9B-8EC4-FAB605C39BC1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24BBEED4-7C10-4A46-9523-865348B5A40C",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92C14354-14B2-4202-A9B8-BB65B0A3BFF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76B05D10-5E4D-4239-B7A7-59540EA8130D",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C5B0A32-50BD-4A9C-B7DA-E6E1D20750F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D92CC2-0EFC-43E2-B0A3-A332F85E5147",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A5FDEBF-EB68-417E-AF0D-1E9D786E019B",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6283DF5E-A2AC-46AA-9DEB-B76DEB52C977",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2135C13B-5395-4FAC-979C-6CAD20EE221F",
              "versionEndExcluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DAE05B-374A-4149-A2FC-0F9246299AAC",
              "versionEndExcluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B16367-B607-4348-9A1B-3D9D7BE6E3C3",
              "versionEndExcluding": "1.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B403690-F713-4253-AAFF-A29FBED8AA71",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F2A3DA7-BEAE-4C71-A0DD-D5D65273CB31",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F7D26BE-4814-4814-AB29-45170C6236CD",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEF64BC9-4F3A-4E18-AE32-04E6C6627D91",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2746858-D63D-4AFF-8DED-BF7C8F2BDC93",
              "versionEndExcluding": "1.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D13A2A-0870-4E48-8309-8A73B9DA9788",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BD6DBA-8298-4CBD-AB0A-86CF9543EB51",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49641455-13A9-4067-94BC-BAD0DF948E2D",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FDB22E5-02F5-4CF5-A486-2D85FCFA0855",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9143906C-717E-4B13-B18F-5345ECCC5813",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A049DB-EABF-47CE-871E-E2953B0B0336",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB4C236-437E-40BE-99E1-5B87A5EDF43D",
              "versionEndExcluding": "1.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3DD8B9-B020-4A9C-9483-59608AF34836",
              "versionEndExcluding": "1.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6CAA8A-9249-4A83-8303-DCD497A3D403",
              "versionEndExcluding": "1.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17D78F4E-3E5F-4429-91D0-00CDB654BE70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC6479E-7D1E-4E75-9655-CC5078EEC971",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D61DE5-4A98-4C38-BE1C-0A201E3DE798",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4F82C96-8A84-4758-B751-2E4EB402D2FF",
              "versionEndExcluding": "1.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CC2924A-4E60-4CD4-9E54-411BE8E100C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "75F79B35-46E0-4690-8C27-CA4566F33EAF",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D860DCF2-327E-4C44-A37D-7DBC73D2CAC4",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A3335E-8963-4134-AAD4-E94DC644BA79",
              "versionEndExcluding": "1.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "590D1992-6123-47C9-A546-BB758754B5D7",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFD58F60-2EA2-4833-9D8B-F85AF0B81719",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05CF252-3A6C-4C51-B3DF-2BBD20BD8AC2",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D16EF7B-4C5C-4BB5-AAE3-8891748F6206",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "065D4968-67D4-4F7D-B359-9A792458AE32",
              "versionEndExcluding": "1.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD02F8F2-E629-4FDA-BCFA-71BA3A64E8D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D70DEF67-E3FA-4725-A5CB-4DCCF4B93809",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA066087-C58B-41D8-ABAC-FC35EB208DEE",
              "versionEndExcluding": "1.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2)."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.06 tienen un control de acceso incorrecto (problema 2 de 2)."
    }
  ],
  "id": "CVE-2019-14306",
  "lastModified": "2024-11-21T04:26:27.530",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-10T18:15:11.583",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN52962201/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2019/0823_1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-03-13 19:15
Modified
2024-11-21 04:26
Severity ?
Summary
Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D5B3F9E-EFE6-4B4D-A77D-857543C5FD7A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12DDFC54-73AD-474E-9150-ED2FBB418ECE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:1.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA52538-4A4E-4927-A7EB-38D14B384FA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA1CCD6-3773-45A1-9A3D-31235783B2C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.05, presentan un M\u00e9todo de Autenticaci\u00f3n Vulnerable a los Ataques de Fuerza Bruta. Algunas impresoras Ricoh no implementaron el bloqueo de cuentas. Por lo tanto, fue posible obtener las credenciales de la cuenta local mediante fuerza bruta."
    }
  ],
  "id": "CVE-2019-14299",
  "lastModified": "2024-11-21T04:26:24.413",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-03-13T19:15:16.697",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-307"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-15 20:15
Modified
2024-11-21 06:09
Severity ?
Summary
RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.
Impacted products
Vendor Product Version
ricoh sp_320dn_firmware 1.06
ricoh sp_320dn -
ricoh sp_325dnw_firmware 1.06
ricoh sp_325dnw -
ricoh sp_320sn_firmware 1.06
ricoh sp_320sn -
ricoh sp_320sfn_firmware 1.06
ricoh sp_320sfn -
ricoh sp_325snw_firmware 1.06
ricoh sp_325snw -
ricoh sp_325sfnw_firmware 1.06
ricoh sp_325sfnw -
ricoh sp_330sn_firmware 1.06
ricoh sp_330sn -
ricoh aficio_sp_3500sf_firmware 1.06
ricoh aficio_sp_3500sf -
ricoh sp_221s_firmware 1.06
ricoh sp_221s -
ricoh sp_220snw_firmware 1.06
ricoh sp_220snw -
ricoh sp_221snw_firmware 1.06
ricoh sp_221snw -
ricoh sp_221sf_firmware 1.06
ricoh sp_221sf -
ricoh sp_220sfnw_firmware 1.06
ricoh sp_220sfnw -
ricoh sp_221sfnw_firmware 1.06
ricoh sp_221sfnw -
ricoh m_c2000_firmware -
ricoh m_c2000 -
ricoh m_c250fwb_firmware -
ricoh m_c250fwb -
ricoh m_c250fw_firmware -
ricoh m_c250fw -
ricoh sp_c260sfnw_firmware -
ricoh sp_c260sfnw -
ricoh sp_c262sfnw_firmware -
ricoh sp_c262sfnw -
ricoh sp_c261sfnw_firmware -
ricoh sp_c261sfnw -
ricoh sp_c250sf_firmware -
ricoh sp_c250sf -
ricoh sp_c252sf_firmware -
ricoh sp_c252sf -
ricoh p_c300w_firmware -
ricoh p_c300w -
ricoh p_c301w_firmware -
ricoh p_c301w -
ricoh sp_c260dnw_firmware -
ricoh sp_c260dnw -
ricoh sp_c262dnw_firmware -
ricoh sp_c262dnw -
ricoh sp_c261dnw_firmware -
ricoh sp_c261dnw -
ricoh sp_c250dn_firmware -
ricoh sp_c250dn -
ricoh sp_c252dn_firmware -
ricoh sp_c252dn -
ricoh m_320_firmware -
ricoh m_320 -
ricoh m_320fb_firmware -
ricoh m_320fb -
ricoh m_320f_firmware -
ricoh m_320f -
ricoh m_2700_firmware -
ricoh m_2700 -
ricoh m_2701_firmware -
ricoh m_2701 -
ricoh sp_330sn_firmware -
ricoh sp_330sn -
ricoh sp_330sfn_firmware -
ricoh sp_330sfn -
ricoh sp_3710sf_firmware -
ricoh sp_3710sf -
ricoh sp_220snw_firmware -
ricoh sp_220snw -
ricoh sp_221snw_firmware -
ricoh sp_221snw -
ricoh sp_220sfnw_firmware -
ricoh sp_220sfnw -
ricoh sp_221sfnw_firmware -
ricoh sp_221sfnw -
ricoh sp_277snwx_firmware -
ricoh sp_277snwx -
ricoh sp_277sfnwx_firmware -
ricoh sp_277sfnwx -
ricoh sp_325snw_firmware -
ricoh sp_325snw -
ricoh sp_325sfnw_firmware -
ricoh sp_325sfnw -
ricoh sp_377snwx_firmware -
ricoh sp_377snwx -
ricoh sp_377sfnwx_firmware -
ricoh sp_377sfnwx -
ricoh sp_212sfnw_firmware -
ricoh sp_212sfnw -
ricoh sp_212sfw_firmware -
ricoh sp_212sfw -
ricoh sp_212snw_firmware -
ricoh sp_212snw -
ricoh sp_212suw_firmware -
ricoh sp_212suw -
ricoh sp_213sfnw_firmware -
ricoh sp_213sfnw -
ricoh sp_213sfw_firmware -
ricoh sp_213sfw -
ricoh sp_213snw_firmware -
ricoh sp_213snw -
ricoh sp_213suw_firmware -
ricoh sp_213suw -
ricoh sp_311sfnw_firmware -
ricoh sp_311sfnw -
ricoh sp_310sfnw_firmware -
ricoh sp_310sfnw -
ricoh sp_312sfnw_firmware -
ricoh sp_312sfnw -
ricoh p_310_firmware -
ricoh p_310 -
ricoh p_311_firmware -
ricoh p_311 -
ricoh sp_330dn_firmware -
ricoh sp_330dn -
ricoh sp_3710dn_firmware -
ricoh sp_3710dn -
ricoh sp_220nw_firmware -
ricoh sp_220nw -
ricoh sp_221nw_firmware -
ricoh sp_221nw -
ricoh sp_277nwx_firmware -
ricoh sp_277nwx -
ricoh sp_325dnw_firmware -
ricoh sp_325dnw -
ricoh sp_377dnwx_firmware -
ricoh sp_377dnwx -
ricoh sp_212nw_firmware -
ricoh sp_212nw -
ricoh sp_212w_firmware -
ricoh sp_212w -
ricoh sp_213nw_firmware -
ricoh sp_213nw -
ricoh sp_213w_firmware -
ricoh sp_213w -
ricoh sp_311dnw_firmware -
ricoh sp_311dnw -
ricoh sp_310dnw_firmware -
ricoh sp_310dnw -
ricoh sp_312dnw_firmware -
ricoh sp_312dnw -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_320dn_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFFCBAA-BE50-4805-9291-5467A9631403",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_320dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95D9780-65C6-4B81-8F35-2813A848A173",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_325dnw_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "962F3947-4221-4635-B1EE-A56241EB6707",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_325dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "573EF7D3-9176-4C34-AA74-3D24B73DFA5C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_320sn_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A71F3CD-560D-477F-9DDD-A287219F0110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_320sn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED832B5-D02F-481C-B37F-C22E4DB0A61E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_320sfn_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "B89AAB7A-9585-4F69-BD14-4F5551F095CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_320sfn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD3EAAEB-4C06-431B-9AFC-F239887D2BB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_325snw_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "13DBA1D9-1213-4369-85F6-1B63637882D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_325snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A09F53C4-8812-4443-BD4B-AF324181C18E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_325sfnw_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B4B586E-1563-4384-9757-312CC88F135B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_325sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D22E053-B67E-4E44-9D57-2435072443D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ECE3F8A-6752-402C-A4FD-8ED32F5E95EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:aficio_sp_3500sf_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BA0414-4E04-4CD0-BA68-87B930387C98",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:aficio_sp_3500sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5F3DA9-0CAF-4406-908E-1EF2BC4D76AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "A05AA95F-1BF7-4745-86B4-67652A75F3B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3F8A2E1-3D08-43F4-AB12-307D6A570550",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA530E6-22C6-421C-89E0-6A44A0348FF5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "38AAF87C-F3B5-423B-B4CA-3D52231E27AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "5393654C-8BB3-4D3C-8680-F70C6AE75EAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "630C8611-B9E2-4F76-82E0-B6304CC369EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_c2000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45BA4A60-4461-49F4-B17B-9A10EC475745",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_c2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DFF8AC-6A24-458B-A889-7B329C308F12",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_c250fwb_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "755683E0-250E-4E6F-B183-B108B5C04741",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C99DFFE-3061-49B6-87FE-A9BFD85F50C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_c250fw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "912DC9F9-1E39-48D2-8AA4-55EF65432A04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2295D3DC-AF14-49C4-851C-11BF07FCB29D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4C4953-C969-4004-882D-6C058563210A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E47AC0F9-6B1E-4A20-87FB-28576209F330",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "846985A5-B69E-4795-B0E2-2D3FC6A85B6B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B991D914-E315-4496-A53C-6A261BDEF441",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A497D5E3-18F7-42E0-82D2-17DEAEFB46C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:p_c300w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3D53358-B3F2-404A-BCDE-32A846476B7E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9905DD-A2CD-41BA-92D9-AD68E891DFA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:p_c301w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A320FC9-9693-4216-B692-561B0650EFFD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F9EADB-0852-447A-BB18-18AA37E1CEBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ED3F89E-5CC3-481B-83A9-9440069D0AD2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D6ED462-2E40-44A9-AF8B-27985FA087B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "083EBD7C-D6A8-45E6-B148-A9D106E1CA81",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21810652-156E-420B-8F3D-EC90B8D37FA4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFFBB4FB-B563-44C3-9717-71D37CC84E71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_320_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE134F15-47ED-44B9-890D-90C599A20EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "622DB5B8-A941-4D27-85D2-D773DE8C8AE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_320fb_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "015DBADB-A471-4D0A-AC2B-A18C3D800CB4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_320fb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08069959-1CE6-4984-AF39-730C47995167",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_320f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "601973FF-2702-4CBB-84C0-2A3C8B808649",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_320f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AA005BA-F4B3-421F-A326-826570E186CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8471CE9D-F89D-4CDF-B221-89C5E383E0E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "624D23F4-CE3B-4AE5-A725-CF011350042F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F9102FE-530E-410E-9635-25F0010B4520",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F6218A-9C8F-4A6D-90D7-87615F45651F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70370362-B452-44AC-897A-AD960E31761C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B3BCF5-B904-4715-BC08-675BFD4917EC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E7A86B7-843F-41B2-AC5A-02528255AAA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4241366A-2231-4785-8C13-9FACBB66AB5A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "567E74DA-1E56-4262-B8CC-C1E94BAFDA45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0734544-6992-427C-BDC2-233261BABB70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FD5B349-DA0D-4295-9B8A-E45BC2E2279C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_325snw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61E0AEBA-F106-4E2D-948F-704D4A101412",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_325snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A09F53C4-8812-4443-BD4B-AF324181C18E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_325sfnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8387E54-CBA8-4D05-A51D-248B8A385C8F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_325sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D22E053-B67E-4E44-9D57-2435072443D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_377snwx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "839D1AD0-614F-4FB6-A1AC-5BA456D33482",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_377snwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1CE7C5-928A-4F5B-9639-C588D2F53052",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_377sfnwx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE400B01-6328-4E05-9C7F-B03F6F5EA5D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_377sfnwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F832C4D-0801-47AC-9356-51CC31AA18F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70368414-B134-46C2-B0CD-6912AC94D055",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D89773C-E6D4-40B0-84DA-CC48B5DB2CEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650D86-B533-41E1-B7EE-63974AF4D642",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D638CE-DC22-403C-B7D9-BBF6907DB5A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09A39236-1C30-47AE-B33E-365E33369F06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2F5261-CB06-4665-8D45-284407D26CBB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34A4A92B-CA2A-4342-9D76-59044C836E1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A22556D8-59FC-41E7-91F9-16EE5435FF80",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_311sfnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A560C602-8B18-4BDF-9841-504E9EF93E4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_311sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "542F28B3-6D96-4D0F-81C4-3E511B58D960",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_310sfnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F71E8F03-9DF7-4A48-BCF4-6E2842BC0DBD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_310sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF4C4841-E950-4F22-A578-FBEB6EF7DD71",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_312sfnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C35518-7548-412D-9982-CB190C175AB7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_312sfnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A06663D7-BCED-465C-82E9-E96EF0115481",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:p_310_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F9401F0-0216-4A4A-B0C1-3EA18A61BA25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:p_310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EC50CE5-F7D0-4D1F-882B-BB2FFEC0866C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:p_311_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7802EE19-0D37-4A36-93AB-3FA87B888145",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:p_311:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86DF94B2-D54C-4BD2-A32C-1F97EA1C58BA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A60FDF-F13B-48F1-AFD5-F081D9484AED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A4A020F-7958-41C3-87FD-CF786D5BA3F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5EB2233-6C50-4536-911E-F5FAB3129A76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58A07E5-5733-4EBB-B5E3-BA5D762BA81F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_277nwx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36E6C927-5BDB-4711-BD30-482F74763AE7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_277nwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95735C72-4F4A-41D2-8116-9086B8E9687E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_325dnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B904062D-A2EE-4B8E-A346-DA9133E2FC27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_325dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "573EF7D3-9176-4C34-AA74-3D24B73DFA5C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_377dnwx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19C80677-D05C-48F2-8769-77740060C32C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_377dnwx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40BB8F8F-3D4E-4CC5-8F80-318AAE09B349",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2B0590-A7CF-478F-B354-8D482D968472",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB556FD4-9796-4F06-8867-74692C4F5FDC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A173A3A0-76E3-418D-B102-435EA9B7ECD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A485D93C-F576-4F19-96EA-A27734B42BFB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_311dnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A886A522-58F7-4CED-B493-35BB67E50FFB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_311dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9911B154-8E41-47F7-9EF8-FDE3AAF3FB64",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_310dnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86DC9091-FD39-4445-827F-4E6E875726F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_310dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42508ED0-CFA7-4C99-A463-945C2D5D3273",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_312dnw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CBA1330-66EF-4781-A0FA-C42CA059F94D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_312dnw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "861D1A70-D4B0-48B5-B9F3-81689A1AEF72",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data."
    },
    {
      "lang": "es",
      "value": "Se ha detectado que los productos de la serie SP de RICOH 320DN, SP 325DNw, SP 320SN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw versi\u00f3n v1.06, contienen un desbordamiento del buffer de pila en el archivo /etc/wpa_supplicant.conf. Esta vulnerabilidad permite a atacantes causar una denegaci\u00f3n de servicio (DoS) por medio de datos desbordados dise\u00f1ados"
    }
  ],
  "id": "CVE-2021-33945",
  "lastModified": "2024-11-21T06:09:47.557",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-15T20:15:07.407",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2022/0228_1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh.com/info/2022/0228_1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-03-13 19:15
Modified
2024-11-21 04:26
Summary
Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D5B3F9E-EFE6-4B4D-A77D-857543C5FD7A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12DDFC54-73AD-474E-9150-ED2FBB418ECE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:1.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA52538-4A4E-4927-A7EB-38D14B384FA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA1CCD6-3773-45A1-9A3D-31235783B2C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.05, permite una denegaci\u00f3n de servicio (problema 1 de 3). Algunas impresoras Ricoh fueron afectadas por una implementaci\u00f3n err\u00f3nea del servicio LPD que conllev\u00f3 a una vulnerabilidad de denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2019-14303",
  "lastModified": "2024-11-21T04:26:26.993",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-03-13T19:15:16.760",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ricoh-usa.com/en/support-and-download"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}