Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown

CVE-2021-33945

Disclosure Date: February 15, 2022 (last updated February 23, 2025)
RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.
Attacker Value
Unknown

CVE-2019-14310

Disclosure Date: March 13, 2020 (last updated February 21, 2025)
Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets
Attacker Value
Unknown

CVE-2019-14303

Disclosure Date: March 13, 2020 (last updated November 27, 2024)
Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability.
Attacker Value
Unknown

CVE-2019-14309

Disclosure Date: March 13, 2020 (last updated February 21, 2025)
Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders.
Attacker Value
Unknown

CVE-2019-14299

Disclosure Date: March 13, 2020 (last updated February 21, 2025)
Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force.
Attacker Value
Unknown

CVE-2019-14301

Disclosure Date: January 10, 2020 (last updated February 21, 2025)
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2).
Attacker Value
Unknown

CVE-2019-14302

Disclosure Date: January 10, 2020 (last updated November 27, 2024)
On Ricoh SP C250DN 1.06 devices, a debug port can be used.
Attacker Value
Unknown

CVE-2019-14304

Disclosure Date: January 10, 2020 (last updated February 21, 2025)
Ricoh SP C250DN 1.06 devices allow CSRF.
Attacker Value
Unknown

CVE-2019-14306

Disclosure Date: November 12, 2019 (last updated November 27, 2024)
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2).
Attacker Value
Unknown

CVE-2019-14307

Disclosure Date: August 26, 2019 (last updated November 27, 2024)
Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
0