This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Ricoh First view 2020-01-10
Product Sp 221snw Firmware Last view 2022-02-15
Version 1.06 Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:ricoh:sp_221snw_firmware

Activity : Overall

Related : CVE

  Date Alert Description
9.8 2022-02-15 CVE-2021-33945

RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.

7.5 2020-01-10 CVE-2019-14306

Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2).

8.8 2020-01-10 CVE-2019-14304

Ricoh SP C250DN 1.06 devices allow CSRF.

6.8 2020-01-10 CVE-2019-14302

On Ricoh SP C250DN 1.06 devices, a debug port can be used.

7.5 2020-01-10 CVE-2019-14301

Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2).

CWE : Common Weakness Enumeration

%idName
33% (1) CWE-787 Out-of-bounds Write
33% (1) CWE-352 Cross-Site Request Forgery (CSRF)
33% (1) CWE-200 Information Exposure