Skip to main content Skip to first level navigation
Skip to main content First level navigation Menu
Breadcrumbs
Main content

Information

Impact of “WannaCry” ransomware on Ricoh products

July. 27, 2017
Ricoh Company, Ltd.

Thank you very much for your continued use of Ricoh products.

We would like to inform you about the “WannaCry” ransomware attack (*) and its effects on our products. (* also referred to as “WannaCrypt”, “Wanna Cryptor”, “WannaCryptor”, “Wcry”)

Please read the following for information about how to continue using your Ricoh products safely.

1. Security patch for this vulnerability

To continue safe operation of some Ricoh Multifunction Printers, Laser Printers, Production Printers and Printer Controller products which use Microsoft Windows operating system, it is necessary to apply the appropriate Microsoft Windows security patch. Please refer to the link below for details.

For all other Office Printing and Commercial Printing products manufactured by Ricoh, we have confirmed that there is no vulnerability to the “WannaCry” ransomware.

2. Effects of disabling SMBv1

In addition to the security patch, Microsoft advises that SMBv1 should be disabled as a countermeasure against the “WannaCry” attack. Please read the Customer Guidance from Microsoft for additional information.

If SMBv1 is disabled on PCs or servers, it will prevent some products from being able to transmit data using SMB. Please refer to the links below for additional information.