Ricoh understands the importance of security and is committed to managing its products and services with the most advanced security technologies possible for its customers worldwide.
Ricoh is aware of the reported "Heap buffer overflow vulnerability in libwebp / libvpx"(CVE-2023-4863/5217).
Heap buffer overflow allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
These vulnerabilities are known to be triggered by the use of features for viewing/browsing images and videos. Therefore, please make sure not to use RICOH products or services to view any untrusted sources (URLs or files).
The impact on Ricoh products and services are currently under investigation. Updates on impacted products and services and related countermeasures will be provided promptly on this page as they become available.
Product/service type | Category | Subcategory | Status |
---|---|---|---|
Office Products | Multifunction Printers/Copiers | Black & White MFP | Partially affected. Please refer to List 2 below for affected products/services. |
Color MFP | Partially affected. Please refer to List 2 below for affected products/services. | ||
Wide Format MFP | Partially affected. Please refer to List 2 below for affected products/services. | ||
Printers | Black & White Laser Printers | Not affected | |
Color Laser Printers | Not affected | ||
Gel Jet Printers | Not affected | ||
FAX | Not affected | ||
Digital Duplicators | Not affected | ||
Projectors | Not affected | ||
Video Conferencing | Not affected | ||
Interactive Whiteboards | Partially affected. Please refer to List 2 below for affected products/services. | ||
Remote Communication Gates | Remote Communication Gate A2 | Not affected | |
Remote Communication Gate A | Not affected | ||
Remote Communication Gate Type N/L/BN1/BM1 | Not affected | ||
Software & Solutions | Card Authentication Package Series | Not affected | |
Device Manager NX Accounting | Not affected | ||
Device Manager NX Lite | Not affected | ||
Docuware | Not affected | ||
GlobalScan NX | Not affected | ||
Enhanced Locked Print Series | Not affected | ||
Printer Driver Packager NX | Not affected | ||
@Remote Connector NX | Not affected | ||
Ricoh Smart Integration (RSI) Platform and its applications | Not affected | ||
RICOH Print Management Cloud | Not affected | ||
RICOH Streamline NX V2 | Not affected | ||
RICOH Streamline NX V3 | Not affected | ||
Commercial & Industrial Printing | Cut sheet Printers | Partially affected. Please refer to List 2 below for affected products/services. | |
Wide Format Printers | Not affected | ||
Continuous Feed | Not affected | ||
Garment Printer | Not affected | ||
Digital Painting | Not affected | ||
Commercial & Industrial Printing Software | Not affected |
Please contact your local Ricoh representative or dealer if you have any queries.
The distribution URL of this page:
https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2023-000003 Please note that any copy or paraphrase of the text of this document that differs in content from the distribution URL link, or omits the URL, is an uncontrolled copy and may lack important information or contain factual errors.