vendor:
Ricoh Printers
by:
Thomas Heverin
6.1
CVSS
HIGH
Directory and File Exposure
200
CWE
Product Name: Ricoh Printers
Affected Version From: All versions
Affected Version To: All versions
Patch Exists: NO
Related CWE:
CPE: h:ricoh:printers
Platforms Tested: Windows
2023
Ricoh Printer Directory and File Exposure
The exploit allows an attacker to connect to a Ricoh printer over FTP using default credentials and access directories such as Help, Info (Printer Information), Prnlog (Print Log), Stat (Statistics), and Syslog (System Log). The attacker can list files and directories, read files, and potentially extract sensitive information.
Mitigation:
To mitigate this vulnerability, it is recommended to change the default credentials on Ricoh printers and restrict access to FTP services. Regularly monitoring FTP connections and reviewing access logs can also help detect unauthorized access.