Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force.
References
Link | Resource |
---|---|
https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/ | Third Party Advisory |
https://www.ricoh-usa.com/en/support-and-download | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2020-03-13 19:15
Updated : 2024-02-28 17:47
NVD link : CVE-2019-14299
Mitre link : CVE-2019-14299
CVE.ORG link : CVE-2019-14299
JSON object : View
Products Affected
ricoh
- sp_c252sf
- sp_c252dn_firmware
- sp_c250sf_firmware
- sp_c252dn
- sp_c250dn
- sp_c250dn_firmware
- sp_c250sf
- sp_c252sf_firmware
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts