Vulnerabilities
Vulnerable Software
Ricoh:  >> Sp C252dn Firmware  Security Vulnerabilities
RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.
CVSS Score
9.8
EPSS Score
0.005
Published
2022-02-15
Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force.
CVSS Score
9.8
EPSS Score
0.004
Published
2020-03-13
Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability.
CVSS Score
7.5
EPSS Score
0.005
Published
2020-03-13
Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders.
CVSS Score
7.5
EPSS Score
0.003
Published
2020-03-13
Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets
CVSS Score
9.8
EPSS Score
0.005
Published
2020-03-13
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2).
CVSS Score
7.5
EPSS Score
0.004
Published
2020-01-10
On Ricoh SP C250DN 1.06 devices, a debug port can be used.
CVSS Score
6.8
EPSS Score
0.001
Published
2020-01-10
Ricoh SP C250DN 1.06 devices allow CSRF.
CVSS Score
8.8
EPSS Score
0.002
Published
2020-01-10
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2).
CVSS Score
7.5
EPSS Score
0.004
Published
2020-01-10
Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
CVSS Score
9.8
EPSS Score
0.013
Published
2019-08-26


Contact Us

Shodan ® - All rights reserved