All the vulnerabilites related to Ricoh Co., Ltd - Web Image Monitor
jvndb-2024-000117
Vulnerability from jvndb
Published
2024-10-31 16:44
Modified
2025-05-19 17:59
Severity ?
Summary
Stack-based buffer overflow vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor
Details
Web Image Monitor provided by Ricoh Company, Ltd. is an web server included and runs in laser printers and MFPs (multifunction printers). Web Image Monitor contains a stack-based buffer overflow vulnerability (CWE-121) due to inappropriate parsing process of HTTP request. Zhihong Tian, Hui Lu, Guocheng Wu, and Xingchi Chen of the Cyberspace Advanced Technology Institute of Guangzhou University reported this vulnerability to Ricoh Company, Ltd. directly and coordinated. After the coordination, Ricoh Company, Ltd. reported this case to IPA under Information Security Early Warning Partnership, and JPCERT/CC coordinated with Ricoh Company, Ltd. for JVN publication.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000117.html",
  "dc:date": "2025-05-19T17:59+09:00",
  "dcterms:issued": "2024-10-31T16:44+09:00",
  "dcterms:modified": "2025-05-19T17:59+09:00",
  "description": "Web Image Monitor provided by Ricoh Company, Ltd. is an web server included and runs in laser printers and MFPs (multifunction printers).\r\nWeb Image Monitor contains a stack-based buffer overflow vulnerability (CWE-121) due to inappropriate parsing process of HTTP request.\r\n\r\nZhihong Tian, Hui Lu, Guocheng Wu, and Xingchi Chen of the Cyberspace Advanced Technology Institute of Guangzhou University reported this vulnerability to Ricoh Company, Ltd. directly and coordinated.\r\nAfter the coordination, Ricoh Company, Ltd. reported this case to IPA under Information Security Early Warning Partnership, and JPCERT/CC coordinated with Ricoh Company, Ltd. for JVN publication.",
  "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000117.html",
  "sec:cpe": {
    "#text": "cpe:/a:ricoh:web_image_monitor",
    "@product": "Web Image Monitor",
    "@vendor": "Ricoh Co., Ltd",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "7.7",
    "@severity": "High",
    "@type": "Base",
    "@vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
    "@version": "3.0"
  },
  "sec:identifier": "JVNDB-2024-000117",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN87770340/index.html",
      "@id": "JVN#87770340",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-47939",
      "@id": "CVE-2024-47939",
      "@source": "CVE"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    }
  ],
  "title": "Stack-based buffer overflow vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor"
}

jvndb-2025-000030
Vulnerability from jvndb
Published
2025-05-12 18:00
Modified
2025-05-12 18:00
Severity ?
Summary
Reflected cross-site scripting vulnerability in Ricoh laser printers and MFPs which implement Web Image Monitor
Details
Web Image Monitor provided by Ricoh Company, Ltd. is an web server included in Ricoh laser printers and MFPs (multifunction printers) and runs on them. Web Image Monitor contains the vulnerability listed below. <ul><li>Reflected cross-site scripting (CWE-79) - CVE-2025-41393</li></ul>Juan Pablo Gomez Postigo of Sprocket Security, Niels Eris of HackDefense, and Vincent Theriault of Precicom Technologies Inc. reported this vulnerability to Ricoh Company, Ltd. directly and coordinated. After the coordination, Ricoh Company, Ltd. reported this case to IPA under Information Security Early Warning Partnership, and JPCERT/CC coordinated with Ricoh Company, Ltd. for JVN publication.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-000030.html",
  "dc:date": "2025-05-12T18:00+09:00",
  "dcterms:issued": "2025-05-12T18:00+09:00",
  "dcterms:modified": "2025-05-12T18:00+09:00",
  "description": "Web Image Monitor provided by Ricoh Company, Ltd. is an web server included in Ricoh laser printers and MFPs (multifunction printers) and runs on them.\r\nWeb Image Monitor contains the vulnerability listed below.\r\n\u003cul\u003e\u003cli\u003eReflected cross-site scripting (CWE-79) - CVE-2025-41393\u003c/li\u003e\u003c/ul\u003eJuan Pablo Gomez Postigo of Sprocket Security, Niels Eris of HackDefense, and Vincent Theriault of Precicom Technologies Inc. reported this vulnerability to Ricoh Company, Ltd. directly and coordinated. \r\nAfter the coordination, Ricoh Company, Ltd. reported this case to IPA under Information Security Early Warning Partnership, and JPCERT/CC coordinated with Ricoh Company, Ltd. for JVN publication.",
  "link": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-000030.html",
  "sec:cpe": {
    "#text": "cpe:/a:ricoh:web_image_monitor",
    "@product": "Web Image Monitor",
    "@vendor": "Ricoh Co., Ltd",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "6.1",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
    "@version": "3.0"
  },
  "sec:identifier": "JVNDB-2025-000030",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN20474768/index.html",
      "@id": "JVN#20474768",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-41393",
      "@id": "CVE-2025-41393",
      "@source": "CVE"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-79",
      "@title": "Cross-site Scripting(CWE-79)"
    }
  ],
  "title": "Reflected cross-site scripting vulnerability in Ricoh laser printers and MFPs which implement Web Image Monitor"
}