vendor:
Ricoh Printers
by:
Thomas Heverin
6.1
CVSS
HIGH
Information Disclosure
200
CWE
Product Name: Ricoh Printers
Affected Version From: All versions
Affected Version To: All versions
Patch Exists: NO
Related CWE:
CPE: ricoh:printer
Platforms Tested: Windows
2023
Ricoh Printer Directory and File Exposure
The exploit allows an attacker to connect to a Ricoh printer over FTP using default credentials and access sensitive directories such as Help, Info (Printer Information), Prnlog (Print Log), Stat (Statistics), and Syslog (System Log) to view files and information without authentication.
Mitigation:
To mitigate this vulnerability, it is recommended to change the default FTP credentials on Ricoh printers to strong, unique passwords. Additionally, restrict FTP access to trusted IP addresses only.