Main content

Notice on potential impact of a heap buffer overflow vulnerability in WebRTC towards RICOH Interactive Whiteboard Controller OP-10/OP-5/OP-5 Type2

First published: 01:00 am on July 30, 2024 (2024-07-30T10:00:00+09:00)
Ricoh Company, Ltd.

Ricoh understands the importance of security and we are committed to managing its products and services with the most advanced security technologies possible for its customers worldwide.
Ricoh is aware of the reported "Heap buffer overflow vulnerability in WebRTC" (CVE-2023-7024) affects RICOH Interactive Whiteboard Controller OP-10/OP-5/OP-5 Type2.
Ricoh offers measures detailed below.

  • Advisory ID
    ricoh-prod000079-2024-000009
  • Version
    1.00E
  • CVE ID (CWE ID)
  • CVSSv3 base score
    8.8HIGH

Potential impact

Heap buffer overflow in WebRTC allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Affected components and versions

Products or Services Components Versions
RICOH Interactive Whiteboard Controller OP-10/OP-5/OP-5 Type2 Microsoft Edge Microsoft Edge Version less than 120.0.2210.91

How to check Microsoft Edge browser version:
1. Run Edge browser on RICOH Interactive Whiteboard.
2. Touch the [Settings] icon.
3. Touch [About Microsoft Edge] on the bottom of the window.

Resolution

Please update Microsoft Edge to Ver.120.0.2210.91 or higher by following steps:

 

1. Go to [About Microsoft Edge] under [Settings] to check Microsoft Edge browser version.
2. If the latest version is available, [About Microsoft Edge] page shows “An update is available. Select Download and install to proceed”.
3. Touch [Download and install] to start downloading.  
4. Once downloading is completed, you will be asked to restart Microsoft Edge browser.
Touch [Restart] to restart Microsoft Edge browser and complete updating.


Contact:

Please contact your local Ricoh representative or dealer if you have any queries.

History :
2024-07-30T10:00:00+09:00 : 1.00E Initial public release

The distribution URL of this page:
https://www.ricoh.com/products/security/vulnerabilities/adv?id=ricoh-prod000079-2024-000009
Please note that any copy or paraphrase of the text of this document that differs in content from the distribution URL link, or omits the URL, is an uncontrolled copy and may lack important information or contain factual errors.