[Japanese]

JVNDB-2024-000083

Firmware update for RICOH JavaTM Platform resets the TLS configuration

Overview

JavaTM Platform provided by Ricoh Company, Ltd. is the execution environment for firmware extensions of Ricoh MFPs and printers, providing TLS (Transport Layer Security) communication mechanism.
When the firmware for JavaTM Platform is updated from Ver.12.89 or earlier versions to a newer version, the TLS configuration is reset to "TLS 1.0: enabled" and "TLS 1.1: enabled" (CWE-1188).

Ricoh Company, Ltd. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Ricoh Company, Ltd. coordinated under the Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 2.4 (Low) [IPA Score]
  • Attack Vector: Adjacent Network
  • Attack Complexity: Low
  • Privileges Required: High
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: None
  • Integrity Impact: Low
  • Availability Impact: None
Affected Products


Ricoh Co., Ltd
  • JavaTM Platform Ver.12.89 and earlier

The following MFPs (multifunction printers) and printers are affected:
  • SP 5300DN/5310DN
  • SP C340DN
  • SP C342DN
  • SP C840DN/C842DN
  • SP C352DN
Impact

The product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities.
Solution

[Update the firmware and Verify the configuration]
Update the JavaTM Platform's firmware to the latest version, and verify the TLS configuration.
Adjust the configuration if needed.

For more details, refer to the developer's information.
Vendor Information

Ricoh Co., Ltd
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2024-41995
References

  1. JVN : JVN#78728294
Revision History

  • [2024/08/06]
      Web page was published