Main content

IMPORTANT Specific Ricoh MFP and Printer Products - Vulnerabilities in the PostScript interpreter (CVE-2024-11344, CVE-2024-11345, CVE-2024-11346, CVE-2024-11347) and the embedded web server (CVE-2025-1127) in P C200W

First published: 06:00 pm on March 17, 2025 (2025-03-18T03:00:00+09:00)
Ricoh Company, Ltd.

Ricoh has identified vulnerabilities in the PostScript interpreter (CVE-2024-11344, CVE-2024-11345, CVE-2024-11346, CVE-2024-11347) and the embedded web server (CVE-2025-1127) in P C200W.
Ricoh offers measures detailed below.

Potential impact

These vulnarevilities allow arbitrary code to be executed remotely.

Affected components and versions

Products or Services Components Versions
P C200W Firmware Ver.1.12(230.329) or earlier

Do the following to determine the firmware version of the device:
1. Select the following from the operation panel.
Settings → Reports → Menu Setting Page
2. Check the firmware level listed under “Device Information".

Resolution

Please download the updated firmware at the following links:
https://support.ricoh.com/bb/html/dr_ut_e/rc3/model/pc200w/pc200w.htm

Fixed version: Ver.1.13

 

Workaround for CVE-2025-1127:
Setting an administrative password on the device (as prompted to do so during initial setup) will prevent an
untrusted user from executing the vulnerability.

 

Ricoh recommends a firmware update if your device has affected firmware.


Contact:

Please contact your local Ricoh representative or dealer if you have any queries.

History :
2025-03-18T03:00:00+09:00 : 1.00E Initial public release

The distribution URL of this page:
https://www.ricoh.com/products/security/vulnerabilities/adv?id=ricoh-prod000065-2025-000003
Please note that any copy or paraphrase of the text of this document that differs in content from the distribution URL link, or omits the URL, is an uncontrolled copy and may lack important information or contain factual errors.