SB2020022511 - Multiple vulnerabilities in Ricoh printers



SB2020022511 - Multiple vulnerabilities in Ricoh printers

Published: February 25, 2020 Updated: February 25, 2020

Security Bulletin ID SB2020022511
Severity
Medium
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 63% Low 38%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2019-14299)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A remote attacker on the local network can send a specially crafted requests to the web server, trigger memory corruption and cause a denial of service condition or execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Information disclosure (CVE-ID: CVE-2019-14301)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to improper access restrictions. A remote attacker on the local network can access the debugging Web page and obtain sensitive information.


3) Improper access control (CVE-ID: CVE-2019-14302)

The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. An attacker with physical access can bypass implemented security restrictions and execute arbitrary code, alter settings, and/or disable the function.


4) Input validation error (CVE-ID: CVE-2019-14303)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker on the local network can execute arbitrary code or cause a denial of service (DoS) condition on the system.


5) Cross-site request forgery (CVE-ID: CVE-2019-14304)

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.


6) Improper Authentication (CVE-ID: CVE-2019-14306)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to improper access restrictions. A remote attacker on the local network can bypass authentication process and gain unauthorized access to the device settings information.


7) Input validation error (CVE-ID: CVE-2019-14309)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker on the local network can execute arbitrary code or cause a denial of service (DoS) condition on the system.

8) Input validation error (CVE-ID: CVE-2019-14310)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker on the local network can execute arbitrary code or cause a denial of service (DoS) condition on the system.

Remediation

Install update from vendor's website.