Security Alerts
Ricoh understands the importance of security and is committed to managing our products and services with the most advanced security technologies available for our customers
We constantly evaluate our products and will update this section whenever new vulnerabilities are identified.
- Notice on potential impact of a heap buffer overflow vulnerability in libwebp (WebP) towards Ricoh products and services
- Notice on potential impact of "Apache ActiveMQ remote code execution vulnerability" (CVE-2023-46604) towards Ricoh products and services
- Notice of security investigation: "Vulnerability of SLP (Service Location Protocol) implementation that allows reflected DoS attacks via UDP" (CVE-2023-29552)
- Update (Added eight vulnerabilities): A Server-Side Request Forgery vulnerability
- A Server-Side Request Forgery vulnerability
- Notice of security investigation: Vulnerability (CVE-2022-43969) towards scanner or FAX-installed Ricoh products that may cause folder user password breach
- Notice of the potential impact of CVE-2022-22963 and Spring4Shell vulnerability CVE-2022-22965 on Ricoh products and services
- Notice on potential impact of vulnerability CVE-2021-33945 towards Ricoh products and service
- Update: Notice on potential impact of Apache Log4j vulnerability towards Ricoh products and services
- Update: Notice on Microsoft Windows Print Spooler Vulnerability