vendor:
                    Ricoh Printers
                by:
                    Thomas Heverin
                6.1
                        CVSS
                    HIGH
                    Directory and File Exposure
                    200
                        CWE
                    Product Name: Ricoh Printers
                    Affected Version From:  All versions
                    Affected Version To:  All versions
                    Patch Exists: NO
                    Related CWE: 
                    CPE:  h:ricoh:printers
                    Platforms Tested:  Windows
                    2023
                    Ricoh Printer Directory and File Exposure
The exploit allows an attacker to connect to a Ricoh printer over FTP using default credentials and access directories such as Help, Info (Printer Information), Prnlog (Print Log), Stat (Statistics), and Syslog (System Log). The attacker can list files and directories, read files, and potentially extract sensitive information.
Mitigation:
					To mitigate this vulnerability, it is recommended to change the default credentials on Ricoh printers and restrict access to FTP services. Regularly monitoring FTP connections and reviewing access logs can also help detect unauthorized access.